schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-2w2v-xcr9-mj4m | 2023-09-25T19:30:06Z | 2022-05-24T16:53:08Z | null | ['CVE-2019-12618'] | Hashicorp Nomad Access Control Issues | HashiCorp Nomad 0.9.0 through 0.9.1 has Incorrect Access Control via the exec driver. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12618'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/issues/5783'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/nomad'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:37:50Z', 'nvd_published_at': '2019-08-12T17:15:00Z'} |
1.4.0 | GHSA-xphq-3x6q-q2qq | 2023-07-24T20:24:31Z | 2022-05-13T01:53:32Z | null | ['CVE-2018-8145'] | ChakraCore information disclosure vulnerability | An information disclosure vulnerability exists when Chakra improperly discloses the contents of its memory, which could provide an attacker with information to further compromise the user's computer or data, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Mi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8145'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8145'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124164314/http://www.securityfocus.com/bid/103986'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T20:24:31Z', 'nvd_published_at': '2018-05-09T19:29:00Z'} |
1.4.0 | GHSA-vpr3-f594-mg5g | 2022-06-17T22:33:40Z | 2022-05-17T03:28:34Z | null | ['CVE-2010-1622'] | Improper Control of Generation of Code ('Code Injection') in Spring Framework | SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring'}, 'range... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-1622'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2011:0175'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2010-1622'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=606706'}, {'type'... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:33:40Z', 'nvd_published_at': '2010-06-21T16:30:00Z'} |
1.4.0 | GHSA-qwgx-59jw-qfg9 | 2022-07-01T11:55:03Z | 2022-05-13T01:14:24Z | null | ['CVE-2017-5662'] | Improper Restriction of XML External Entity Reference in Apache Batik | In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the ser... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5662'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2546'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2547'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0319'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T11:55:03Z', 'nvd_published_at': '2017-04-18T14:59:00Z'} |
1.4.0 | GHSA-m7m4-4vm8-55wg | 2022-05-31T21:54:25Z | 2022-05-24T17:06:13Z | null | ['CVE-2015-8549'] | PyAMF vulnerable to XML external entity (XXE) | PyAMF provides Action Message Format (AMF) support for Python that is compatible with the Adobe Flash Player. It includes integration with Python web frameworks like Django, Pylons, Twisted, SQLAlchemy, web2py and more. XML external entity (XXE) vulnerability in PyAMF before 0.8.0 allows remote attackers to cause a den... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyamf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8549'}, {'type': 'WEB', 'url': 'https://github.com/hydralabs/pyamf/pull/58'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m7m4-4vm8-55wg'}, {'type': 'PACKAGE', 'url': 'https://github.com/hydralabs/pyamf'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-31T21:54:25Z', 'nvd_published_at': '2020-01-15T15:15:00Z'} |
1.4.0 | GHSA-m7cc-6vhg-39wr | 2023-08-01T20:15:51Z | 2022-05-13T01:12:49Z | null | ['CVE-2015-5331'] | Moodle improper access control | Moodle 2.9.x before 2.9.3 does not properly check the contact list before authorizing message transmission, which allows remote authenticated users to bypass intended access restrictions and conduct spam attacks via the messaging API. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9'}, {'fixed': '2.9.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5331'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/cd0c9ac87d75b3d893d61df21e3ecfd12c065c1f'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=323228'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=mood... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T20:15:51Z', 'nvd_published_at': '2016-02-22T05:59:00Z'} |
1.4.0 | GHSA-j63v-wcf9-c9hm | 2023-09-26T18:54:19Z | 2022-05-24T17:00:25Z | null | ['CVE-2019-8119'] | Magento 2 Community Edition RCE Vulnerability | A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. An authenticated admin user with import product privileges can delete files through bulk product import and inject code into XSLT file. The combination of these manipulations can lead to... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8119'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T17:42:51Z', 'nvd_published_at': '2019-11-05T23:15:00Z'} |
1.4.0 | GHSA-h2wq-prv9-2f56 | 2022-05-24T22:06:26Z | 2022-05-24T22:06:26Z | null | ['CVE-2022-29192'] | Missing validation crashes `QuantizeAndDequantizeV4Grad` | ### Impact
The implementation of [`tf.raw_ops.QuantizeAndDequantizeV4Grad`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L148-L226) does not fully validate the input arguments. This results in a `CHECK`-failure which can be ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h2wq-prv9-2f56'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29192'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/098e7762d909bac47ce1dbabe6dfd06294cb9d58'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:06:26Z', 'nvd_published_at': '2022-05-20T21:15:00Z'} |
1.4.0 | GHSA-g7r3-jwhw-2wfv | 2023-08-23T17:58:02Z | 2022-05-24T17:33:54Z | null | ['CVE-2020-23136'] | Microweber Insufficient Session Expiry | Microweber v1.1.18 is affected by no session expiry after log-out. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.1.18']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23136'}, {'type': 'WEB', 'url': 'https://gist.github.com/virendratiwari03/0b0d161e1141fdd74122abbb02fefe17'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}] | {'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T21:47:43Z', 'nvd_published_at': '2020-11-09T18:15:00Z'} |
1.4.0 | GHSA-jffq-528j-mp6c | 2022-06-24T01:26:08Z | 2022-05-24T17:12:53Z | null | ['CVE-2020-10991'] | Improper Restriction of XML External Entity Reference in Mulesoft APIkit | Mulesoft APIkit through 1.3.0 allows XXE because of validation/RestXmlSchemaValidator.java | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'rg.mule.modules:mule-apikit-module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10991'}, {'type': 'WEB', 'url': 'https://github.com/mulesoft/apikit/issues/547'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:26:08Z', 'nvd_published_at': '2020-03-27T00:15:00Z'} |
1.4.0 | GHSA-5cxw-8v65-76vf | 2022-12-13T18:59:35Z | 2022-05-24T17:46:47Z | null | ['CVE-2021-21641'] | CSRF vulnerability in Jenkins promoted builds Plugin | promoted builds Plugin 3.9 and earlier does not require POST requests for HTTP endpoints implementing promotion (regular, forced, and re-execute), resulting in cross-site request forgery (CSRF) vulnerabilities.
These vulnerabilities allow attackers to promote builds.
promoted builds Plugin 3.9.1 requires POST request... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21641'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/promoted-builds-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-04-07/#SECURITY-2293'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T18:59:35Z', 'nvd_published_at': '2021-04-07T14:15:00Z'} |
1.4.0 | GHSA-62xg-239j-vxg7 | 2022-06-17T22:28:38Z | 2022-05-02T04:00:27Z | null | ['CVE-2009-5011'] | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in pyftpdlib | Race condition in the FTPHandler class in ftpserver.py in pyftpdlib before 0.5.2 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the getpeername function having an ENOTCONN error, a different vulnerability than CVE-2010-3494. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-5011'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-62xg-239j-vxg7'}, {'type': 'PACKAGE', 'url': 'https://github.com/giampaolo/pyftpdlib'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyftpd... | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:28:38Z', 'nvd_published_at': '2010-10-19T20:00:00Z'} |
1.4.0 | GHSA-hwrx-wc75-mgh7 | 2023-01-27T00:18:49Z | 2022-05-14T02:42:49Z | null | ['CVE-2010-3978'] | Spree allows remote attackers to obtain sensitive information | Spree 0.11.x before 0.11.2 and 0.30.x before 0.30.0 exchanges data using JavaScript Object Notation (JSON) without a mechanism for validating requests, which allows remote attackers to obtain sensitive information via vectors involving (1) `admin/products.json`, (2) `admin/users.json`, or (3) `admin/overview/get_report... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.11.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3978'}, {'type': 'WEB', 'url': 'https://github.com/railsdog/spree/commit/19944bd999c310d9b10d16a41f48ebac97dc4fac'}, {'type': 'WEB', 'url': 'https://github.com/railsdog/spree/commit/d881b2bb610ea33e2364ff16feb8e702dfeda135'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:18:49Z', 'nvd_published_at': '2010-11-17T16:00:00Z'} |
1.4.0 | GHSA-p5x5-jg3j-2jcj | 2023-01-05T21:09:57Z | 2022-05-24T17:10:30Z | null | ['CVE-2020-2159'] | OS command injection in CryptoMove Plugin | CryptoMove Plugin 0.1.33 and earlier allows the configuration of an OS command to execute as part of its build step configuration. This command will be executed on the Jenkins controller as the OS user account running Jenkins, allowing user with Job/Configure permission to execute an arbitrary OS command on the Jenkins... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cryptomove'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.33'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2159'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cryptomove-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1635'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T21:09:57Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
1.4.0 | GHSA-g3vq-f35v-vhgm | 2022-11-22T18:57:12Z | 2022-05-13T01:47:06Z | null | ['CVE-2017-7684'] | Apache OpenMeetings vulnerable to Uncontrolled Resource Consumption | Apache OpenMeetings 1.0.0 doesn't check contents of files being uploaded. An attacker can cause a denial of service by uploading multiple large files to the server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7684'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/v6dpmrdd6cgg66up'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99584'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:12Z', 'nvd_published_at': '2017-07-17T13:18:00Z'} |
1.4.0 | GHSA-h7h6-fwpv-ggvx | 2023-07-13T17:04:27Z | 2022-05-24T17:44:37Z | null | ['CVE-2021-20279'] | Moodle contains Stored XSS via ID number user profile field | The ID number user profile field required additional sanitizing to prevent a stored XSS risk in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '3.10.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.10.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'EC... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20279'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/a7e0ba1e71205ccb0a73dedee414f1a167ee2ed7'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1939033'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:04:27Z', 'nvd_published_at': '2021-03-15T22:15:00Z'} |
1.4.0 | GHSA-r7p6-fr3x-r877 | 2023-01-14T05:29:43Z | 2022-05-17T05:31:33Z | null | ['CVE-2011-3712'] | CakePHP 1.3.7 allows remote attackers to obtain sensitive information via a direct request to a .php file | CakePHP 1.3.7 allows remote attackers to obtain sensitive information via a direct request to a `.php` file, which reveals the installation path in an error message, as demonstrated by `dispatcher.php` and certain other files. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.7'}, {'fixed': '1.3.8'}]}], 'versions': ['1.3.7']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-3712'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}, {'type': 'WEB', 'url': 'http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README'}, {'type': 'WEB', 'url': 'http://code.google.com/p/inspathx/source/browse... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:29:43Z', 'nvd_published_at': '2011-09-23T23:55:00Z'} |
1.4.0 | GHSA-95q3-pppp-r683 | 2022-11-01T22:33:40Z | 2022-05-14T01:38:24Z | null | ['CVE-2018-1330'] | Crash when decoding malformed HTTP requests or malformed JSON payload | When parsing a malformed JSON payload, libprocess in Apache Mesos versions 1.4.0 to 1.5.0 might crash due to an uncaught exception. Parsing chunked HTTP requests with trailers can lead to a libprocess crash too because of the mistakenly planted assertion. A malicious actor can therefore cause a denial of service of Mes... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1330'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/395cb6bcf367702acd1e580a1f39b56cdd7a5953d0368b4c1adb1dde@<dev.mesos.apache.org>'}] | {'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:33:40Z', 'nvd_published_at': '2018-09-13T19:29:00Z'} |
1.4.0 | GHSA-v6xv-rmqc-wcc8 | 2023-08-16T22:31:44Z | 2022-05-17T03:45:52Z | null | ['CVE-2014-9508'] | Typo3 Open Redirect In Frontend Rendering | The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, allows remote attackers to change URLs to arbitrary domains.
An attacker could forge a request which modifies anchor only links on the homepage of a TYPO3 installation such that they point to arbitrar... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.39'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.38'}}, {'package': {'ecosystem': 'Packagist', ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9508'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html'}, {'type': 'WEB', 'url': 'http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/'}] | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:31:44Z', 'nvd_published_at': '2015-01-04T21:59:00Z'} |
1.4.0 | GHSA-9rvw-7mx7-h53x | 2022-12-21T00:20:43Z | 2022-05-24T17:27:06Z | null | ['CVE-2020-2241'] | CSRF vulnerability in Jenkins Database Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins database Plugin 1.6 and earlier allows attackers to connect to an attacker-specified database server using attacker-specified credentials.
Database Plugin 1.7 requires POST requests for the affected form validation method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2241'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/database-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1024'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T00:20:43Z', 'nvd_published_at': '2020-09-01T14:15:00Z'} |
1.4.0 | GHSA-7c7v-g484-j4cf | 2023-07-21T18:39:24Z | 2022-05-13T01:18:42Z | null | ['CVE-2018-0993'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0993'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/4bdd0efb1c309a0307cdfbd2856ca8cd88b154bb'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0993'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T18:39:24Z', 'nvd_published_at': '2018-04-12T01:29:00Z'} |
1.4.0 | GHSA-5g7f-p7jg-v6mv | 2023-01-26T23:56:32Z | 2022-05-14T03:47:43Z | null | ['CVE-2014-4998'] | lean-ruport allows local users to obtain sensitive information by listing the process | `test/tc_database.rb` in the lean-ruport gem 0.3.8 for Ruby places the mysql user password on the mysqldump command line, which allows local users to obtain sensitive information by listing the process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'lean-ruport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4998'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/07/18'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/lean-ruport-0... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:56:32Z', 'nvd_published_at': '2018-01-10T18:29:00Z'} |
1.4.0 | GHSA-g7p7-x6w7-w6qg | 2022-05-24T22:19:58Z | 2022-05-04T00:00:19Z | null | ['CVE-2022-27313'] | Arbitrary file deletion in gitea | An arbitrary file deletion vulnerability in Gitea v1.16.3 allows attackers to cause a Denial of Service (DoS) via deleting the configuration file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27313'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/19072'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases/tag/v1.16.4'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:19:58Z', 'nvd_published_at': '2022-05-03T20:15:00Z'} |
1.4.0 | GHSA-57q5-x8jf-g7h8 | 2022-07-01T11:43:57Z | 2022-05-13T01:47:01Z | null | ['CVE-2017-7561'] | Inconsistent Interpretation of HTTP Requests in Red Hat JBoss EAP | Red Hat JBoss EAP version 3.0.7.Final until 3.0.25.Final, 3.5.0.CR1, and 4.0.0.Beta1 is vulnerable to a server-side cache poisoning or CORS requests in the JAX-RS component resulting in a moderate impact. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteas:resteasy-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.7.Final'}, {'fixed': '3.0.25.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.24.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7561'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0003'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0004'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T11:43:57Z', 'nvd_published_at': '2017-09-13T17:29:00Z'} |
1.4.0 | GHSA-38pm-74xc-phcw | 2022-12-14T16:12:42Z | 2022-05-24T19:04:53Z | null | ['CVE-2021-21665'] | CSRF vulnerability in Jenkins XebiaLabs XL Deploy Plugin allows capturing credentials | A cross-site request forgery (CSRF) vulnerability in Jenkins XebiaLabs XL Deploy Plugin 10.0.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing Username/password credentials stored in Jenkins.
XebiaLabs XL Deploy Pl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xebialabs.deployit.ci:deployit-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21665'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xldeploy-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-1982'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T16:12:42Z', 'nvd_published_at': '2021-06-10T15:15:00Z'} |
1.4.0 | GHSA-7xp8-7wqx-5hqx | 2022-12-19T21:14:28Z | 2022-05-24T17:07:41Z | null | ['CVE-2020-2105'] | Jenkins REST APIs vulnerable to clickjacking | Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not serve the `X-Frame-Options: deny` HTTP header on REST API responses to protect against clickjacking attacks. An attacker could exploit this by routing the victim through a specially crafted web page that embeds a REST API endpoint in an iframe and tricking the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.204.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.204.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2105'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0402'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0675'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0681'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-1021'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:14:28Z', 'nvd_published_at': '2020-01-29T16:15:00Z'} |
1.4.0 | GHSA-9pvj-pgg9-pvqq | 2023-07-20T18:13:07Z | 2022-05-13T01:18:33Z | null | ['CVE-2018-0859'] | ChakraCore RCE Vulnerability | Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0859'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/8a2c3730f9fd775380dc8226dbf3a697c691b73d'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0859'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:13:07Z', 'nvd_published_at': '2018-02-15T02:29:00Z'} |
1.4.0 | GHSA-226h-qrg4-8236 | 2022-12-29T01:44:53Z | 2022-05-24T17:28:26Z | null | ['CVE-2020-2269'] | Stored XSS vulnerability in chosen-views-tabbar Plugin | Jenkins chosen-views-tabbar Plugin 1.2 and earlier does not escape view names in the dropdown to select views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to configure views. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:chosen-views-tabbar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2269'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/chosen-views-tabbar'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1869'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:44:53Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-wx2w-8pqw-vp4g | 2022-11-22T19:03:08Z | 2022-05-24T17:11:49Z | null | ['CVE-2019-20528'] | Ignite Realtime Openfire allows Cross-site Scripting | Ignite Realtime Openfire 4.4.1 allows XSS via the setup/setup-datasource-standard.jsp username parameter. This issue was fixed in version 4.4.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:xmppserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20528'}, {'type': 'WEB', 'url': 'https://www.netsparker.com/web-applications-advisories/ns-19-015-reflected-cross-site-scripting-in-openfire/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:03:08Z', 'nvd_published_at': '2020-03-18T19:15:00Z'} |
1.4.0 | GHSA-cpv6-pfq6-j2v7 | 2023-01-27T00:52:53Z | 2022-05-13T01:36:51Z | null | ['CVE-2017-2662'] | katello Improper Privilege Management vulnerability | A flaw was found in Foreman's katello plugin version 3.4.5. After setting a new role to allow restricted access on a repository with a filter (filter set on the Product Name), the filter is not respected when the actions are done via hammer using the repository id. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'katello'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.0.rc1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2662'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/pull/8772'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/commit/853260e3e9f94179d5881199e7885d1c08e600f6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_b... | {'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:52:53Z', 'nvd_published_at': '2018-08-22T16:29:00Z'} |
1.4.0 | GHSA-gqqm-564f-vvxq | 2023-08-16T09:30:57Z | 2022-05-14T01:57:02Z | null | ['CVE-2013-2134'] | Arbitrary code execution in Apache Struts 2 | Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.14.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2134'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-015'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-201409-04.xml'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T21:07:40Z', 'nvd_published_at': '2013-07-16T18:55:00Z'} |
1.4.0 | GHSA-6m48-jxwx-76q7 | 2022-07-08T19:07:27Z | 2022-05-14T01:10:35Z | null | ['CVE-2013-2067'] | Improper Authentication in Apache Tomcat | java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by s... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.21'}, {'fixed': '6.0.37'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2067'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271a... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:07:27Z', 'nvd_published_at': '2013-06-01T14:21:00Z'} |
1.4.0 | GHSA-mjqc-5c9x-xfcc | 2022-06-08T22:35:32Z | 2022-05-18T00:00:34Z | 2022-06-08T22:35:32Z | [] | Duplicate advisory: Configuration exposure in github.com/coreos/ignition | ## Duplicate Advisory
This advisory is a duplicate of [GHSA-hj57-j5cw-2mwp](https://github.com/advisories/GHSA-hj57-j5cw-2mwp). This link is preserved to maintain external references.
## Original Description
A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/coreos/ignition/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1706'}, {'type': 'WEB', 'url': 'https://github.com/coreos/ignition/issues/1300'}, {'type': 'WEB', 'url': 'https://github.com/coreos/ignition/issues/1315'}, {'type': 'WEB', 'url': 'https://github.com/coreos/ignition/pull/1350'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:37:07Z', 'nvd_published_at': '2022-05-17T18:15:00Z'} |
1.4.0 | GHSA-vhqr-3gr2-7px9 | 2023-08-28T23:12:07Z | 2022-05-14T02:00:54Z | null | ['CVE-2018-14840'] | Subrion CMS Cross-site Scripting | `uploads/.htaccess` in Subrion CMS 4.2.1 allows XSS because it does not block .html file uploads (but does block, for example, .htm file uploads). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14840'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/773'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/commit/b12e287d3814c0f2d0b1892f95fc0190972d2ba5'}, {'type': 'WEB', 'url': 'https://github.com/intel... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:12:07Z', 'nvd_published_at': '2018-08-02T01:29:00Z'} |
1.4.0 | GHSA-42q4-9xf9-f67x | 2022-08-11T18:25:38Z | 2022-05-24T19:20:31Z | null | ['CVE-2021-41972'] | Apache Superset allowed for database connections password leak for authenticated users | Apache Superset up to and including 1.3.1 allowed for database connections password leak for authenticated users. This information could be accessed in a non-trivial way. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41972'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-42q4-9xf9-f67x'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset/'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-s... | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:09:18Z', 'nvd_published_at': '2021-11-12T19:15:00Z'} |
1.4.0 | GHSA-98hq-3qvg-pg78 | 2023-03-09T00:35:52Z | 2022-05-13T01:31:05Z | null | ['CVE-2017-14506'] | Gem in a Box vulnerable to Cross-site Scripting | geminabox (aka Gem in a Box) before 0.13.6 is vulnerable to Cross-site Scripting (XSS), as demonstrated by uploading a gem file that has a crafted gem.homepage value in its .gemspec file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'geminabox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14506'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/geminabox/commit/99aaae196c4fc6ae0df28e186ca1e493ae658e02'}, {'type': 'PACKAGE', 'url': 'https://github.com/geminabox/geminabox'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/ge... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T00:35:52Z', 'nvd_published_at': '2017-09-25T08:29:00Z'} |
1.4.0 | GHSA-wv8g-fx9j-q2jg | 2023-08-16T23:11:59Z | 2022-05-17T03:57:46Z | null | ['CVE-2014-7217'] | phpMyAdmin cross-site scripting Vulnerability via ENUM value | Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.4, 4.1.x before 4.1.14.5, and 4.2.x before 4.2.9.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted ENUM value that is improperly handled during rendering of the (1) table search or (2) table struc... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.10.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'a... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7217'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/304fb2b645b36a39e03b954fdbd567173ebe6448'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/c1a3f85fbd1a9569646e7cf1b791325ae82c7961'}, {'type':... | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:11:59Z', 'nvd_published_at': '2014-10-03T01:55:00Z'} |
1.4.0 | GHSA-5hjh-c26m-xw8w | 2022-05-04T20:14:02Z | 2022-05-03T00:00:44Z | null | ['CVE-2022-25850'] | ProxyScotch is vulnerable to a server-side Request Forgery (SSRF) | ProxyScotch is a simple proxy server created for hoppscotch.io. The package github.com/hoppscotch/proxyscotch before 1.0.0 are vulnerable to Server-side Request Forgery (SSRF) when interceptor mode is set to proxy. It occurs when an HTTP request is made by a backend server to an untrusted URL submitted by a user. It le... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hoppscotch/proxyscotch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25850'}, {'type': 'WEB', 'url': 'https://github.com/hoppscotch/proxyscotch/commit/de67380f62f907f201d75854b76024ba4885fab7'}, {'type': 'PACKAGE', 'url': 'https://github.com/hoppscotch/proxyscotch'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:14:02Z', 'nvd_published_at': '2022-05-01T16:15:00Z'} |
1.4.0 | GHSA-92pg-8g57-hqpx | 2022-12-13T18:58:12Z | 2022-05-24T17:43:01Z | null | ['CVE-2021-21621'] | Support bundles can include user session IDs in Jenkins Support Core Plugin | Support Core Plugin 2.72 and earlier provides the serialized user authentication as part of the \"About user (basic authentication details only)\" information (`user.md`).
In some configurations, this can include the session ID of the user creating the support bundle. Attackers with access to support bundle content an... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:support-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.72.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.72'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21621'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/support-core-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2150'}] | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T18:58:12Z', 'nvd_published_at': '2021-02-24T16:15:00Z'} |
1.4.0 | GHSA-66rm-wg7m-8pgv | 2022-12-28T22:44:27Z | 2022-05-24T17:28:27Z | null | ['CVE-2020-2273'] | CSRF vulnerability in ElasTest Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins ElasTest Plugin 1.2.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:elastest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2273'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/elastest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1903'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T22:44:27Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-w6pw-5gh5-4952 | 2023-08-29T21:30:16Z | 2022-05-17T04:32:00Z | null | ['CVE-2012-5495'] | Plone python code injection | python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to "go_back." | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5495'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:30:16Z', 'nvd_published_at': '2014-09-30T14:55:00Z'} |
1.4.0 | GHSA-wmr8-25ff-ggpj | 2022-06-28T23:28:29Z | 2022-05-13T01:01:02Z | null | ['CVE-2018-1999004'] | Incorrect Authorization in Jenkins | A Improper authorization vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in SlaveComputer.java that allows attackers with Overall/Read permission to initiate agent launches, and abort in-progress agent launches. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.121.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.122'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999004'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-18/#SECURITY-892'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}... | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:28:29Z', 'nvd_published_at': '2018-07-23T19:29:00Z'} |
1.4.0 | GHSA-9f9r-w3xq-f722 | 2023-09-28T20:41:18Z | 2022-05-14T01:38:19Z | null | ['CVE-2019-7168'] | Croogo vulnerable to XSS in Blog field | A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Blog field to `/admin/nodes/nodes/add/blog`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7168'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/issues/886'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/commit/cafaaabe2cef3d1d83652370e30563e6ad7c4158'}, {'type': 'PACKAGE', 'url': 'https://github.com/croogo/croogo'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:20:43Z', 'nvd_published_at': '2019-01-29T18:29:00Z'} |
1.4.0 | GHSA-88fh-8979-q2rr | 2023-07-25T18:49:01Z | 2022-05-14T03:04:23Z | null | ['CVE-2018-13339'] | Angular Redactor XSS Vulnerability | Imperavi Redactor 3 in Angular Redactor 1.1.6, when HTML content mode is used, allows stored XSS, as demonstrated by an onerror attribute of an IMG element, a related issue to CVE-2018-7035. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'angular-redactor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13339'}, {'type': 'WEB', 'url': 'https://github.com/TylerGarlick/angular-redactor/issues/77'}, {'type': 'WEB', 'url': 'https://github.com/gleez/cms/issues/796'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:49:01Z', 'nvd_published_at': '2018-07-05T22:29:00Z'} |
1.4.0 | GHSA-cmxj-wx9v-52qr | 2022-07-07T22:38:20Z | 2022-05-14T03:59:54Z | null | ['CVE-2014-3604'] | Improper Validation of Certificate with Host Mismatch in Not Yet Commons SSL | Certificates.java in Not Yet Commons SSL before 0.3.15 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'ca.juliusdavies:not-yet-commons-ssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3604'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1131803'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/97659'}, {'type': 'WEB', 'url': 'https://github.com/victims/victims-cve-db/blob/mast... | {'cwe_ids': ['CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:38:20Z', 'nvd_published_at': '2014-10-25T00:55:00Z'} |
1.4.0 | GHSA-5fq9-x9f4-x2r2 | 2022-12-07T18:14:25Z | 2022-05-13T01:48:38Z | null | ['CVE-2018-1000608'] | Jenkins z/OS Connector Plugin allows local attacker to retrieve configured password | A exposure of sensitive information vulnerability exists in Jenkins z/OS Connector Plugin 1.2.6.1 and earlier in SCLMSCM.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the configured password. IBM z/OS Connector Plugi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:zos-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.6.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000608'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/zos-connector-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-25/#SECURITY-950'}] | {'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T18:14:25Z', 'nvd_published_at': '2018-06-26T17:29:00Z'} |
1.4.0 | GHSA-79h8-7735-v3f9 | 2022-12-28T22:49:00Z | 2022-05-24T17:28:27Z | null | ['CVE-2020-2276'] | System command execution vulnerability in Selection tasks Jenkins Plugin | Jenkins Selection tasks Plugin 1.0 and earlier executes a user-specified program on the Jenkins controller, allowing attackers with Job/Configure permission to execute an arbitrary system command on the Jenkins controller as the OS user that the Jenkins process is running as. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:selection-tasks-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2276'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/selection-tasks-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1967'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T22:49:00Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-5wrx-85mr-7hrg | 2023-07-21T17:58:33Z | 2022-05-13T01:20:43Z | null | ['CVE-2018-8266'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8380, CVE-2018-8381, CVE-2018-8384. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8266'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5596'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d52c72d247cfe6348ae563c6bb4118aa8c42aabf'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T17:58:33Z', 'nvd_published_at': '2018-08-15T17:29:00Z'} |
1.4.0 | GHSA-xvgx-668j-f67p | 2023-09-28T19:53:57Z | 2022-05-24T17:17:57Z | null | ['CVE-2019-20389'] | Subrion CMS XSS | An XSS issue was identified on the Subrion CMS 4.2.1 /panel/configuration/general settings page. A remote attacker can inject arbitrary JavaScript code in the `v[language_switch]` parameter (within multipart/form-data), which is reflected back within a user's browser without proper output encoding. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20389'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157699/Subrion-CMS-4.2.1-Cross-Site-Scripting.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:46:44Z', 'nvd_published_at': '2020-05-15T18:15:00Z'} |
1.4.0 | GHSA-6h5x-7c5m-7cr7 | 2022-05-25T19:28:43Z | 2022-05-13T00:01:12Z | null | ['CVE-2022-1650'] | Exposure of Sensitive Information in eventsource | When fetching an url with a link to an external site (Redirect), the users Cookies & Autorisation headers are leaked to the third party application. According to the same-origin-policy, the header should be "sanitized." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'eventsource'}, 'ecosystem_specific': {'affected_functions': ['EventSource']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'eventsource'}, 'ecosystem_specific': {'affected_functions': ['EventS... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1650'}, {'type': 'WEB', 'url': 'https://github.com/EventSource/eventsource/pull/273#issuecomment-1127624508'}, {'type': 'WEB', 'url': 'https://github.com/EventSource/eventsource/commit/f9f6416567bff62c1af2f4314be51d9870e94bc2'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:27:47Z', 'nvd_published_at': '2022-05-12T11:15:00Z'} |
1.4.0 | GHSA-2pp9-r4rv-6p6j | 2022-06-28T23:42:00Z | 2022-05-14T01:05:26Z | null | ['CVE-2018-1999006'] | Exposure of Sensitive Information to an Unauthorized Actor in Jenkins | A exposure of sensitive information vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Plugin.java that allows attackers to determine the date and time when a plugin HPI/JPI file was last extracted, which typically is the date of the most recent installation/upgrade. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.121.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.122'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999006'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-18/#SECURITY-925'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:42:00Z', 'nvd_published_at': '2018-07-23T19:29:00Z'} |
1.4.0 | GHSA-gwfg-cqmg-cf8f | 2023-03-08T19:59:16Z | 2022-05-24T17:30:10Z | null | ['CVE-2020-25613'] | WEBRick vulnerable to HTTP Request/Response Smuggling | An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), whic... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'webrick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25613'}, {'type': 'WEB', 'url': 'https://github.com/ruby/webrick/commit/076ac636bf48b7a492887ce4de7041de23e6c00d'}, {'type': 'WEB', 'url': 'https://github.com/ruby/webrick/commit/8946bb38b4d87549f0d99ed73c62c41933f97cc7'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T19:59:16Z', 'nvd_published_at': '2020-10-06T13:15:00Z'} |
1.4.0 | GHSA-jjmg-xmq2-g6ff | 2023-09-26T19:25:55Z | 2022-05-24T17:00:28Z | null | ['CVE-2019-8152'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting (XSS) vulnerability exists in in Magento 1 prior to 1.9.4.3 and 1.14.4.3, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with access to the wysiwyg editor can abuse the `blockDirective()` function and inject malicious javascript in the cache of t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8152'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211209030216/https://magento.com/security/patches/supee-11219'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:13:44Z', 'nvd_published_at': '2019-11-06T00:15:00Z'} |
1.4.0 | GHSA-5vmg-x99g-396q | 2023-08-22T14:38:20Z | 2022-05-24T17:24:28Z | null | ['CVE-2020-13970'] | Shopware vulnerable to SSRF | Shopware before 6.2.3 is vulnerable to a Server-Side Request Forgery (SSRF) in its "Mediabrowser upload by URL" feature. This allows an authenticated user to send HTTP, HTTPS, FTP, and SFTP requests on behalf of the Shopware platform server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13970'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-07-2020'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/changelo... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T21:05:17Z', 'nvd_published_at': '2020-07-28T21:15:00Z'} |
1.4.0 | GHSA-7jf5-p556-75pr | 2022-12-06T21:35:55Z | 2022-05-24T16:59:37Z | null | ['CVE-2019-10470'] | Jenkins Kubernetes CI/CD Plugin vulnerable to Credential Enumeration | A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
## Note: Jenkins has suspended distribution of this plugin. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.elasticbox.jenkins-ci.plugins:kubernetes-ci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10470'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-ci-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(2)'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/kubernetes-... | {'cwe_ids': ['CWE-276', 'CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:35:55Z', 'nvd_published_at': '2019-10-23T13:15:00Z'} |
1.4.0 | GHSA-vqh4-crjf-jjxx | 2023-07-28T23:19:01Z | 2022-05-14T02:11:54Z | null | ['CVE-2016-1866'] | Salt Improper Access Control | Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2015.8'}, {'fixed': '2015.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1866'}, {'type': 'WEB', 'url': 'https://docs.saltstack.com/en/latest/topics/releases/2015.8.4.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/saltstack/salt'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-03/msg000... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T23:19:01Z', 'nvd_published_at': '2016-04-12T14:59:00Z'} |
1.4.0 | GHSA-hf62-5vxh-jpwj | 2023-08-01T23:40:34Z | 2022-05-24T17:01:23Z | null | ['CVE-2019-18985'] | Pimcore 2FA Vulnerable to Brute Forcing | Pimcore before 6.2.2 lacks brute force protection for the 2FA token. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18985'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/9f2d075243a8392c114d9a8028858b9faf041e2d'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/compare/v6.2.1...v6.2.2'}] | {'cwe_ids': ['CWE-307'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:40:34Z', 'nvd_published_at': '2019-11-15T05:15:00Z'} |
1.4.0 | GHSA-8486-h39x-cx2f | 2022-11-08T23:05:43Z | 2022-05-13T01:48:39Z | null | ['CVE-2018-1000610'] | Jenkins Configuration as Code Plugin has Insufficiently Protected Credentials | A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to Jenkins log files to obtain the passwords configured using Configur... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins:configuration-as-code'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8-alpha'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000610'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-25/#SECURITY-929'}] | {'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T23:05:43Z', 'nvd_published_at': '2018-06-26T17:29:00Z'} |
1.4.0 | GHSA-3fj4-q72x-x2g9 | 2023-07-31T19:43:14Z | 2022-05-17T02:37:05Z | null | ['CVE-2016-7405'] | ADOdb Library SQL Injection | The `qstr` method in the PDO driver in the ADOdb Library for PHP before 5.x before 5.20.7 might allow remote attackers to conduct SQL injection attacks via vectors related to incorrect quoting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'adodb/adodb-php'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.20.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7405'}, {'type': 'WEB', 'url': 'https://github.com/ADOdb/ADOdb/issues/226'}, {'type': 'WEB', 'url': 'https://github.com/ADOdb/ADOdb/commit/bd9eca9f40220f9918ec3cc7ae9ef422b3e448b8'}, {'type': 'WEB', 'url': 'https://github.com/ADOdb/ADOdb/blob/v5.20... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:43:14Z', 'nvd_published_at': '2016-10-03T18:59:00Z'} |
1.4.0 | GHSA-6qr6-x7jm-x2q6 | 2022-07-06T20:13:55Z | 2022-05-14T01:10:16Z | null | ['CVE-2015-5174'] | Improper Limitation of a Pathname to a Restricted Directory in Apache Tomcat | Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResou... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0.RC1'}, {'fixed': '8.0.27'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.26'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ran... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5174'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1432'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1433'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1434'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:13:55Z', 'nvd_published_at': '2016-02-25T01:59:00Z'} |
1.4.0 | GHSA-r642-gv9p-2wjj | 2022-05-24T20:47:34Z | 2022-05-24T20:47:34Z | null | ['CVE-2022-29165'] | Argo CD will blindly trust JWT claims if anonymous access is enabled | ### Impact
A critical vulnerability has been discovered in Argo CD which would allow unauthenticated users to impersonate as any Argo CD user or role, including the `admin` user, by sending a specifically crafted JSON Web Token (JWT) along with the request. In order for this vulnerability to be exploited, [anonymous a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed... | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-r642-gv9p-2wjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29165'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/releases/tag/v2.1.15'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/... | {'cwe_ids': ['CWE-200', 'CWE-287', 'CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T20:47:34Z', 'nvd_published_at': '2022-05-20T15:15:00Z'} |
1.4.0 | GHSA-j448-j653-r3vj | 2023-08-17T23:32:17Z | 2022-05-14T01:10:36Z | null | ['CVE-2013-4286'] | Apache Tomcat is vulnerable to HTTP request-smuggling | Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4286'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1069921'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=e... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T23:32:17Z', 'nvd_published_at': '2014-02-26T14:55:00Z'} |
1.4.0 | GHSA-w6q7-ww2x-7gm3 | 2022-06-17T22:33:12Z | 2022-05-02T06:19:37Z | null | ['CVE-2010-1157'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat | Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.5.29'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-1157'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:33:12Z', 'nvd_published_at': '2010-04-23T14:30:00Z'} |
1.4.0 | GHSA-2g32-2j8w-2qgf | 2022-12-12T21:05:12Z | 2022-05-14T03:23:41Z | null | ['CVE-2018-1000153'] | Jenkins vSphere Plugin Cross-Site Request Forgery vulnerability | A cross-site request forgery vulnerability exists in Jenkins vSphere Plugin 2.16 and older in Clone.java, CloudSelectorParameter.java, ConvertToTemplate.java, ConvertToVm.java, Delete.java, DeleteSnapshot.java, Deploy.java, ExposeGuestInfo.java, FolderVSphereCloudProperty.java, PowerOff.java, PowerOn.java, Reconfigure.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vsphere-cloud'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.16'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000153'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vsphere-cloud-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-745'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:05:12Z', 'nvd_published_at': '2018-04-05T13:29:00Z'} |
1.4.0 | GHSA-h86h-8ppg-mxmh | 2023-02-08T00:35:49Z | 2022-05-24T19:03:29Z | null | ['CVE-2021-31525'] | golang.org/x/net/http/httpguts vulnerable to Uncontrolled Recursion | net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server, Transport, and Client can each be affected in some configurations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/http/httpguts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20210428140749-89ef3d95e781'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31525'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/45710'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/go'}, {'type': 'WEB', 'url': 'https://go.dev/cl/313069'}, {'type': 'WEB', 'url': 'https://go.dev/issue/45710'}, {'ty... | {'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:35:49Z', 'nvd_published_at': '2021-05-27T13:15:00Z'} |
1.4.0 | GHSA-33vg-hpx5-pfxg | 2023-01-26T23:53:25Z | 2022-05-05T00:29:10Z | null | ['CVE-2013-4593'] | omniauth-facebook Improper Authentication vulnerability | RubyGem omniauth-facebook has an access token security vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-facebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4593'}, {'type': 'WEB', 'url': 'https://github.com/simi/omniauth-facebook/commit/115c0a768cd6f4b9bfae8900f8e3fc4fbeec3ad8'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89040'}, {'type': 'PACKAGE', 'url': 'https://g... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:53:25Z', 'nvd_published_at': '2019-12-11T14:15:00Z'} |
1.4.0 | GHSA-6q4g-84f3-mw74 | 2022-12-15T17:39:41Z | 2022-05-24T19:16:59Z | null | ['CVE-2021-21682'] | Improper handling of equivalent directory names on Windows in Jenkins | Jenkins stores jobs and other entities on disk using their name shown on the UI as file and folder names.
On Windows, when specifying a file or folder with a trailing dot character (`example.`), the file or folder will be treated as if that character was not present (`example`). As both are legal names for jobs and ot... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.304'}, {'fixed': '2.315'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.314'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21682'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2424'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10/06/1'}] | {'cwe_ids': ['CWE-42'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:39:41Z', 'nvd_published_at': '2021-10-06T23:15:00Z'} |
1.4.0 | GHSA-cp7v-vmv7-6x2q | 2022-07-01T21:34:47Z | 2022-05-13T01:38:10Z | null | ['CVE-2017-12196'] | Incorrect Authorization in Undertow | Undertow before versions 1.4.18.SP1 (not findable in Maven), 2.0.2.Final, and 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0.Alpha1'}, {'fixed': '2.0.2.FInal'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.1.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undert... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12196'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/facb33a5cedaf4b7b96d3840a08210370a806870'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0478'}, {'type': 'WEB', 'url': 'https://access.redhat.com... | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:34:47Z', 'nvd_published_at': '2018-04-18T01:29:00Z'} |
1.4.0 | GHSA-w78q-4w34-jrjx | 2023-08-25T21:43:03Z | 2022-05-17T00:01:25Z | null | ['CVE-2022-0578'] | Publify vulnerable to code injection | Code Injection in GitHub repository publify/publify prior to 9.2.8. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0578'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/b50df050c593cc532b2c516792989bcfce2d73f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:48:03Z', 'nvd_published_at': '2022-05-16T15:15:00Z'} |
1.4.0 | GHSA-39qc-96h7-956f | 2023-09-29T17:03:45Z | 2022-05-24T16:53:19Z | null | ['CVE-2019-9514'] | golang.org/x/net/http vulnerable to a reset flood | Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. Servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20190813141303-74dc4d7220e7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9514'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2594'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2661'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2682'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:30:39Z', 'nvd_published_at': '2019-08-13T21:15:00Z'} |
1.4.0 | GHSA-p3rw-88pp-w4jh | 2023-07-27T20:17:30Z | 2022-05-17T02:34:59Z | null | ['CVE-2017-0236'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in Microsoft Edge in the way that the Chakra JavaScript engine renders when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0224, CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0236'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/2959'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1ae7e3ce95515758b4cd7215cb4e48539a0f4031'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T20:17:30Z', 'nvd_published_at': '2017-05-12T14:29:00Z'} |
1.4.0 | GHSA-jjmv-6fv4-85vf | 2023-02-23T20:31:28Z | 2022-05-24T16:56:45Z | null | ['CVE-2019-10413'] | Jenkins Data Theorem Mobile Security: CI/CD Plugin has Insufficiently Protected Credentials | Data Theorem Mobile Security: CI/CD Plugin stored a proxy password unencrypted in job `config.xml` files on the Jenkins controller. This password could be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Data Theorem Mobile Security: CI/CD Plugin now stores the proxy pass... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.datatheorem.mobileappsecurity.jenkins.plugin:datatheorem-mobile-app-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10413'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1557'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}] | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T20:31:28Z', 'nvd_published_at': '2019-09-25T16:15:00Z'} |
1.4.0 | GHSA-m7pr-m4cx-6m22 | 2022-12-22T14:03:16Z | 2022-05-24T17:12:41Z | null | ['CVE-2020-2169'] | Reflected XSS vulnerability in Jenkins Queue cleanup Plugin | A form validation HTTP endpoint in Queue cleanup Plugin 1.3 and earlier does not escape a query parameter displayed in an error message. This results in a reflected cross-site scripting vulnerability (XSS).
Queue cleanup Plugin 1.4 correctly escapes the query parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:queue-cleanup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2169'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/queue-cleanup-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1724'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T14:03:16Z', 'nvd_published_at': '2020-03-25T17:15:00Z'} |
1.4.0 | GHSA-2h9c-34v6-3qmr | 2023-07-31T23:55:42Z | 2022-05-13T01:09:54Z | null | ['CVE-2015-7561'] | Kubernetes in OpenShift3 Access Control Misconfiguration | Kubernetes in OpenShift3 allows remote authenticated users to use the private images of other users should they know the name of said image. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0-alpha.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7561'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/18909'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1291963'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T23:55:42Z', 'nvd_published_at': '2017-08-07T17:29:00Z'} |
1.4.0 | GHSA-g97c-jfx6-xvxh | 2023-08-03T21:48:26Z | 2022-05-17T03:25:24Z | null | ['CVE-2015-8125'] | Symfony Vulnerable to Timing Attack | Symfony 2.3.x before 2.3.35, 2.6.x before 2.6.12, and 2.7.x before 2.7.7 might allow remote attackers to have unspecified impact via a timing attack involving the (1) `Symfony/Component/Security/Http/RememberMe/PersistentTokenBasedRememberMeServices` or (2) `Symfony/Component/Security/Http/Firewall/DigestAuthentication... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.12'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8125'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/pull/16630'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2015-8125-potential-remote-timing-attack-vulnerability-in-security-remember-me-service'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:48:26Z', 'nvd_published_at': '2015-12-07T20:59:00Z'} |
1.4.0 | GHSA-5v77-j66x-4c4g | 2022-05-24T22:07:44Z | 2022-05-24T22:07:44Z | null | ['CVE-2022-29196'] | Missing validation causes denial of service via `Conv3DBackpropFilterV2` | ### Impact
The implementation of [`tf.raw_ops.Conv3DBackpropFilterV2`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/conv_grad_ops_3d.cc) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5v77-j66x-4c4g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29196'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/174c5096f303d5be7ed2ca2662b08371bff4ab88'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:07:44Z', 'nvd_published_at': '2022-05-20T22:16:00Z'} |
1.4.0 | GHSA-fv25-wrff-wf86 | 2022-05-24T22:05:59Z | 2022-05-24T22:05:59Z | null | ['CVE-2022-29191'] | Missing validation causes denial of service via `GetSessionTensor` | ### Impact
The implementation of [`tf.raw_ops.GetSessionTensor`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/session_ops.cc#L94-L112) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fv25-wrff-wf86'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29191'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/48305e8ffe5246d67570b64096a96f8e315a7281'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:05:59Z', 'nvd_published_at': '2022-05-20T21:15:00Z'} |
1.4.0 | GHSA-jpmf-8cj2-595g | 2022-07-07T22:33:19Z | 2022-05-17T04:20:31Z | null | ['CVE-2014-3627'] | Improper Link Resolution Before File Access in Apache Hadoop | The YARN NodeManager daemon in Apache Hadoop 0.23.0 through 0.23.11 and 2.x before 2.5.2, when using Kerberos authentication, allows remote cluster users to change the permissions of certain files to world-readable via a symlink attack in a public tar archive, which is not properly handled during localization, related ... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '1.0.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3627'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/hadoop-general/201411.mbox/%3CCALwhT97dOi04aC3VbekaB+zn2UAS_OZV2EAiP78GmjnMzfp2Ug@mail.gmail.com%3E'}] | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:33:19Z', 'nvd_published_at': '2014-12-05T16:59:00Z'} |
1.4.0 | GHSA-w6c2-jrhh-jrxg | 2022-12-20T22:39:49Z | 2022-05-24T17:27:06Z | null | ['CVE-2020-2249'] | Credentials stored in plain text by Jenkins tfs Plugin | tfs Plugin 5.157.1 and earlier stores a webhook secret unencrypted in its global configuration file `hudson.plugins.tfs.TeamPluginGlobalConfig.xml` on the Jenkins controller as part of its configuration. This secret can be viewed by attackers with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:tfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.157.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2249'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/tfs-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1506'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09/01/3... | {'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:39:49Z', 'nvd_published_at': '2020-09-01T14:15:00Z'} |
1.4.0 | GHSA-m63h-q4x3-6hwj | 2023-08-17T22:57:53Z | 2022-05-13T01:12:59Z | null | ['CVE-2013-2083'] | Moodle is vulnerable to Improper Input Validation in MoodleQuickForm class | The MoodleQuickForm class in `lib/formslib.php` in Moodle through 2.1.10, 2.2.x before 2.2.10, 2.3.x before 2.3.7, and 2.4.x before 2.4.4 does not properly handle a certain array-element syntax, which allows remote attackers to bypass intended form-data filtering via a crafted request. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.10'}}, {'package': {'ecosystem': 'Packagist', ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2083'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=228935'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-38885... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:57:53Z', 'nvd_published_at': '2013-05-25T03:18:00Z'} |
1.4.0 | GHSA-23cr-5hr4-rgwv | 2022-07-06T20:11:13Z | 2022-05-17T03:22:06Z | null | ['CVE-2015-6524'] | Improper Input Validation in Apache ActiveMQ | The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows wildcard operators in usernames, which allows remote attackers to obtain credentials via a brute force attack. NOTE: this identifier was SPLIT from CVE-2014-3612 per ADT2 due to dif... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.10.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.10.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-6524'}, {'type': 'WEB', 'url': 'http://activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168094.html'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:11:13Z', 'nvd_published_at': '2015-08-24T14:59:00Z'} |
1.4.0 | GHSA-cv78-v957-jx34 | 2022-07-27T22:17:45Z | 2022-05-24T17:12:57Z | null | ['CVE-2020-7599'] | Exposure of Sensitive Information in Gradle publish plugin | All versions of com.gradle.plugin-publish before 0.11.0 are vulnerable to Insertion of Sensitive Information into Log File. When a plugin author publishes a Gradle plugin while running Gradle with the --info log level flag, the Gradle Logger logs an AWS pre-signed URL. If this build log is publicly visible (as it is in... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.gradle.publish:plugin-publish-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.gradle.plugin-publish:com.gradle.plugin-publish.gradle.plugin'}, 'ranges': [{'type': 'ECOSYST... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7599'}, {'type': 'WEB', 'url': 'https://blog.gradle.org/plugin-portal-update'}, {'type': 'WEB', 'url': 'https://plugins.gradle.org/plugin/com.gradle.plugin-publish'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMGRADLEPLUGINPUBLISH-559... | {'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:17:45Z', 'nvd_published_at': '2020-03-30T19:15:00Z'} |
1.4.0 | GHSA-j69r-w67w-gf35 | 2023-07-31T19:07:34Z | 2022-05-14T02:24:57Z | null | ['CVE-2016-0191'] | ChakraCore RCE Vulnerability | The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0186 and CVE-2016-0193. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0191'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d21529b131d831fc4470139bfc90d80ae7481fa2'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-052'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:07:34Z', 'nvd_published_at': '2016-05-11T01:59:00Z'} |
1.4.0 | GHSA-wvj5-r78r-hhfq | 2023-07-31T18:26:03Z | 2022-05-14T03:10:21Z | null | ['CVE-2016-2403'] | Symfony Authentication Bypass | Symfony before 2.8.6 and 3.x before 3.0.6 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2403'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123224944/http://www.securityfocus.com/bid/96137'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4262'}, {'type': 'WEB', 'url': 'http://symfony.com/blog/cve-2016-2... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:26:03Z', 'nvd_published_at': '2017-02-07T17:59:00Z'} |
1.4.0 | GHSA-723p-9rcj-xv8j | 2023-01-14T05:27:55Z | 2022-05-24T17:08:47Z | null | ['CVE-2020-2123'] | RCE vulnerability in RadarGun Plugin | RadarGun Plugin 1.7 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution vulnerability exploitable by users able to configure RadarGun Plugin’s build step.
RadarGun Plugin 1.8 configures its YAML parser to only instantiate safe types. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:radargun'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2123'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/radargun-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1733'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:27:55Z', 'nvd_published_at': '2020-02-12T15:15:00Z'} |
1.4.0 | GHSA-hpxv-vpfv-7jc9 | 2023-09-25T18:59:06Z | 2022-05-24T16:52:23Z | null | ['CVE-2019-7854'] | Magento 2 Community Edition IDOR Vulnerability | An insecure direct object reference (IDOR) vulnerability in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 can lead to unauthorized disclosure of company credit history details. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7854'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}] | {'cwe_ids': ['CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T21:02:25Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-c27h-mcmw-48hv | 2023-02-14T00:56:25Z | 2022-05-24T16:57:28Z | null | ['CVE-2019-10202'] | Deserialization of Untrusted Data in org.codehaus.jackson:jackson-mapper-asl | A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mit... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.jackson:jackson-mapper-asl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10202'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10202'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e%40%3Cissues.hive.apache.org%3E'}, ... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:56:25Z', 'nvd_published_at': '2019-10-01T15:15:00Z'} |
1.4.0 | GHSA-3cwf-pwcg-57xr | 2023-07-20T18:24:47Z | 2022-05-13T01:18:31Z | null | ['CVE-2018-0835'] | ChakraCore RCE Vulnerability | Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0836, CVE-2018-0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0835'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d318150296e09a369202434fe6d6f70673422b6a'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0835'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:24:47Z', 'nvd_published_at': '2018-02-15T02:29:00Z'} |
1.4.0 | GHSA-r8vh-cm9f-rc29 | 2023-07-27T22:32:19Z | 2022-05-17T02:51:51Z | null | ['CVE-2017-7391'] | Magmi XSS Vulnerability | A Cross-Site Scripting (XSS) was discovered in Magmi 0.7.22. The vulnerability exists due to insufficient filtration of user-supplied data (prefix) passed to the `magmi-git-master/magmi/web/ajax_gettime.php` URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable webs... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dweeves/magmi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.24'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.22'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7391'}, {'type': 'WEB', 'url': 'https://github.com/dweeves/magmi-git/issues/522'}, {'type': 'WEB', 'url': 'https://github.com/dweeves/magmi-git/pull/525'}, {'type': 'WEB', 'url': 'https://github.com/dweeves/magmi-git/commit/a9566b141b58bf40a9dd904a... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T22:32:19Z', 'nvd_published_at': '2017-04-01T02:59:00Z'} |
1.4.0 | GHSA-r7c8-hghc-2mp8 | 2023-08-17T21:45:08Z | 2022-05-17T02:44:28Z | null | ['CVE-2011-2481'] | Apache Tomcat Allows Replacing of XML Parser | Apache Tomcat 7.0.x before 7.0.17 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application. ... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2481'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://issues.apache.org/bugzilla/show_bug.cgi?id=51395'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111209022500/http://www.securityfocus.... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:50:47Z', 'nvd_published_at': '2011-08-15T21:55:00Z'} |
1.4.0 | GHSA-gh27-38p5-mrxc | 2022-06-29T22:43:46Z | 2022-05-13T01:02:18Z | null | ['CVE-2018-1288'] | Improper Control of Generation of Code in Apache Kafka | In Apache Kafka 0.9.0.0 to 0.9.0.1, 0.10.0.0 to 0.10.2.1, 0.11.0.0 to 0.11.0.2, and 1.0.0, authenticated Kafka users may perform action reserved for the Broker via a manually created fetch request interfering with data replication, resulting in data loss. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0.0'}, {'fixed': '0.10.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10.2.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'range... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1288'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/29f61337323f48c47d4b41d74b9e452bd60e65d0e5103af9a6bb2fef@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:43:46Z', 'nvd_published_at': '2018-07-26T14:29:00Z'} |
1.4.0 | GHSA-5xrj-ghhp-hx7p | 2023-02-08T18:11:54Z | 2022-05-17T03:43:30Z | null | ['CVE-2016-0757'] | OpenStack Image Service (Glance) vulnerable to Improper Access Control | OpenStack Image Service (Glance) before 2015.1.3 (kilo) and 11.0.x before 11.0.2 (liberty), when show_multiple_locations is enabled, allow remote authenticated users to change image status and upload new image data by removing the last location of an image. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0757'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0309'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0352'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0354'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:11:54Z', 'nvd_published_at': '2016-04-13T17:59:00Z'} |
1.4.0 | GHSA-mxv3-qcmf-r6wj | 2023-07-24T22:11:43Z | 2022-05-14T01:31:22Z | null | ['CVE-2018-16629'] | Subrion CMS XSS | `panel/uploads/#elf_l1_XA` in Subrion CMS v4.2.1 allows XSS via an SVG file with JavaScript in a SCRIPT element. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16629'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/777'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/commit/fbc29ddb29e9c9732695e25ad2c22e038eed6385'}, {'type': 'WEB', 'url': 'https://github.com/secur... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T22:11:43Z', 'nvd_published_at': '2018-12-04T16:29:00Z'} |
1.4.0 | GHSA-f6mg-hmfp-6grw | 2022-12-29T01:43:51Z | 2022-05-24T17:28:26Z | null | ['CVE-2020-2265'] | Stored XSS vulnerability in Coverage/Complexity Scatter Plot Plugin | Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not escape the method information in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin's post-build step. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:covcomplplot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2265'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/covcomplplot-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1913'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:43:51Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-v7mh-3jgf-r26c | 2023-02-08T17:56:11Z | 2022-05-17T01:42:16Z | null | ['CVE-2012-4406'] | OpenStack Object Storage (swift) Code Injection vulnerability | OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4406'}, {'type': 'WEB', 'url': 'https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2012:1379'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errat... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:56:11Z', 'nvd_published_at': '2012-10-22T23:55:00Z'} |
1.4.0 | GHSA-j5qh-cp3p-2h87 | 2023-08-16T23:27:55Z | 2022-05-17T04:44:51Z | null | ['CVE-2014-2741'] | Ignite Realtime Openfire vulnerable to XMPPbomb attack | nio/XMLLightweightParser.java in Ignite Realtime Openfire before 3.9.2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2741'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/commit/3aec383e07ee893b77396fe946766bbd3758af77'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140407092132/http://xmpp.org/resources/security-notices/uncontrolled... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:27:55Z', 'nvd_published_at': '2014-04-11T01:55:00Z'} |
1.4.0 | GHSA-gfhf-2xr5-2fvw | 2023-09-26T20:41:18Z | 2022-05-24T17:11:33Z | null | ['CVE-2019-19211'] | Dolibarr ERP and CRM contain XSS Vulnerability | Dolibarr ERP/CRM before 10.0.3 has an Insufficient Filtering issue that can lead to user/card.php XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19211'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/en/security-advisories/usd-2019-0053/'}, {'type': 'WEB', 'url': 'https://www.dolibarr.org/forum/dolibarr-changelogs'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T23:42:41Z', 'nvd_published_at': '2020-03-16T15:15:00Z'} |
1.4.0 | GHSA-7pwf-jg34-hxwp | 2022-05-20T16:58:38Z | 2022-05-20T16:58:38Z | null | ['CVE-2022-24878'] | Improper path handling in Kustomization files allows for denial of service | The kustomize-controller enables the use of Kustomize’s functionality when applying Kubernetes declarative state onto a cluster. A malicious user can use a specially crafted `kustomization.yaml` to cause Denial of Service at controller level.
In multi-tenancy deployments this can lead to multiple tenants not being abl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/kustomize-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.24.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/flux2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.19.0'}, {'f... | [{'type': 'WEB', 'url': 'https://github.com/fluxcd/flux2/security/advisories/GHSA-7pwf-jg34-hxwp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24878'}, {'type': 'PACKAGE', 'url': 'https://github.com/fluxcd/flux2'}] | {'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-20T16:58:38Z', 'nvd_published_at': '2022-05-06T02:15:00Z'} |
1.4.0 | GHSA-r5c5-pr8j-pfp7 | 2023-09-29T15:47:38Z | 2022-05-24T16:45:25Z | null | ['CVE-2019-11840'] | golang.org/x/crypto/salsa20/salsa uses insufficiently random values | An issue was discovered in supplementary Go cryptography libraries, aka golang-googlecode-go-crypto, before 2019-03-20. A flaw was found in the amd64 implementation of golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa. If more than 256 GiB of keystream is generated, or if the counter otherwise grows gre... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20190320223903-b7391e95e576'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11840'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/30965'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1691529'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/go'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:33:46Z', 'nvd_published_at': '2019-05-09T16:29:00Z'} |
1.4.0 | GHSA-rh8q-vjgf-gf74 | 2022-07-06T20:12:37Z | 2022-05-14T01:10:16Z | null | ['CVE-2015-5345'] | Improper Limitation of a Pathname to a Restricted Directory in Apache Tomcat | The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M2'}]}], 'versions': ['9.0.0.M1']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5345'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1087'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1088'}, {'type': 'WEB', 'url': 'https://bto.bluecoat.com/security-advisory/sa118'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:12:37Z', 'nvd_published_at': '2016-02-25T01:59:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.