schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-653q-vqm6-gmjm
2023-09-26T17:20:13Z
2022-05-24T17:00:23Z
null
['CVE-2019-8090']
Magento 2 Community Edition Arbitrary File Deletion
An arbitrary file deletion vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. An authenticated users can manipulate the design layout update feature.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8090'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:14:47Z', 'nvd_published_at': '2019-11-05T22:15:00Z'}
1.4.0
GHSA-jxjc-6xmh-h7mg
2023-08-23T17:58:32Z
2022-05-24T17:31:03Z
null
['CVE-2020-24408']
Magento 2 Community Edition XSS Vulnerability
Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by a persistent XSS vulnerability that allows users to upload malicious JavaScript via the file upload component. This vulnerability could be abused by an unauthenticated attacker to execute XSS attacks against other Magento users. This vulnerability require...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24408'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://helpx.adobe.com/security/products/magento/apsb20-59.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T23:06:59Z', 'nvd_published_at': '2020-10-16T15:15:00Z'}
1.4.0
GHSA-q9x6-7hjh-q9fc
2023-07-20T18:17:58Z
2022-05-13T01:18:33Z
null
['CVE-2018-0857']
ChakraCore RCE Vulnerability
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0857'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6f4265c3db2aad323bce617324190d021c11126f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0857'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:17:58Z', 'nvd_published_at': '2018-02-15T02:29:00Z'}
1.4.0
GHSA-g434-3q2j-hj4r
2023-07-25T21:28:58Z
2022-05-14T03:08:36Z
null
['CVE-2018-12071']
CodeIgniter Session Fixation Vulnerability
A Session Fixation issue exists in CodeIgniter before 3.1.9 because `session.use_strict_mode` in the Session Library was mishandled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12071'}, {'type': 'WEB', 'url': 'https://github.com/bcit-ci/CodeIgniter/issues/5958'}, {'type': 'WEB', 'url': 'https://github.com/bcit-ci/CodeIgniter/commit/800a20d6c4662d99ae0988b2f8f2238bb8bb29db'}, {'type': 'WEB', 'url': 'https://web.archive.org...
{'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:28:58Z', 'nvd_published_at': '2018-06-17T20:29:00Z'}
1.4.0
GHSA-qm7f-r83w-3p46
2022-07-01T17:31:59Z
2022-05-13T01:08:56Z
null
['CVE-2017-3161']
Improper Neutralization of Input During Web Page Generation in Apache Hadoop
The HDFS web UI in Apache Hadoop before 2.7.0 is vulnerable to a cross-site scripting (XSS) attack through an unescaped query parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3161'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r127f75748fcabc63bc5a1bec6885753eb9b2bed803b6ed7bd46f965b@%3Cuser.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r66de86b9a608c1da70b2d27d765...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:31:59Z', 'nvd_published_at': '2017-04-26T20:59:00Z'}
1.4.0
GHSA-9hvf-pfq3-7pp6
2022-12-21T16:37:12Z
2022-05-24T17:06:22Z
null
['CVE-2020-2090']
CSRF vulnerability in Jenkins Amazon EC2 Plugin
Amazon EC2 Plugin 1.47 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to Jenkins to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method. This vulnerability m...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.48'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2090'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1004'}]
{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T16:37:12Z', 'nvd_published_at': '2020-01-15T16:15:00Z'}
1.4.0
GHSA-8h76-7vc3-mj3v
2023-07-26T23:42:06Z
2022-05-17T00:32:12Z
null
['CVE-2017-11792']
ChakraCore RCE Vulnerability
ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allow an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11793, CVE-2017-11796, CVE-201...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11792'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/3917'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/4e319aa937eeb0c076411ac0fd644225753bcc72'}, {'type': 'WEB', 'url': 'https://portal.msrc...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T23:42:06Z', 'nvd_published_at': '2017-10-13T13:29:00Z'}
1.4.0
GHSA-cpcw-p965-wpqx
2023-08-02T22:38:29Z
2022-05-24T17:21:16Z
null
['CVE-2020-14019']
rtslib-fb weak permissions for /etc/target/saveconfig.json file
Python rtslib-fb through 2.1.72 has weak permissions for `/etc/target/saveconfig.json` because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rtslib-fb'}, 'ecosystem_specific': {'affected_functions': ['rtslib.root.RTSRoot.save_to_file']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.73'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.72'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14019'}, {'type': 'WEB', 'url': 'https://github.com/open-iscsi/rtslib-fb/pull/162'}, {'type': 'WEB', 'url': 'https://github.com/open-iscsi/rtslib-fb/commit/b23d061ee0fa7924d2cdce6194c313b9ee06c468'}, {'type': 'PACKAGE', 'url': 'https://github.com/o...
{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T22:38:29Z', 'nvd_published_at': '2020-06-19T11:15:00Z'}
1.4.0
GHSA-22pv-7v9j-hqxp
2023-08-17T22:51:04Z
2022-05-05T00:29:17Z
null
['CVE-2013-4752']
Symfony Host Header Injection vulnerability in the HttpFoundation component
Symfony 2.0.X before 2.0.24, 2.1.X before 2.1.12, 2.2.X before 2.2.5, and 2.3.X before 2.3.3 have an issue in the HttpFoundation component. The Host header can be manipulated by an attacker when the framework is generating an absolute URL. A remote attacker could exploit this vulnerability to inject malicious content i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.24'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4752'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4752'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/86365'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerab...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:51:04Z', 'nvd_published_at': '2020-01-02T17:15:00Z'}
1.4.0
GHSA-g8pg-qrvm-wgh2
2022-06-24T00:58:46Z
2022-05-24T17:12:40Z
null
['CVE-2020-2161']
Improper Neutralization of Input During Web Page Generation in Jenkins
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier does not properly escape node labels that are shown in the form validation for label expressions on job configuration pages, resulting in a stored XSS vulnerability exploitable by users able to define node labels.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.228'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.204.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2161'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1781'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/25/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:58:46Z', 'nvd_published_at': '2020-03-25T17:15:00Z'}
1.4.0
GHSA-6gfm-gpr3-8wh9
2023-07-20T18:30:30Z
2022-05-24T16:52:52Z
null
['CVE-2018-20962']
Backpack\CRUD for Laravel XSS Vulnerability
The Backpack\CRUD Backpack component before 3.4.9 for Laravel allows XSS via the select field type.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'backpack/crud'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20962'}, {'type': 'WEB', 'url': 'https://github.com/Laravel-Backpack/CRUD/issues/1297'}, {'type': 'WEB', 'url': 'https://github.com/Laravel-Backpack/CRUD/commit/8b6bd0a2d489a4690f6b1d7ace67e2f07f5f0cc6'}, {'type': 'WEB', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:30:30Z', 'nvd_published_at': '2019-08-08T20:15:00Z'}
1.4.0
GHSA-2r2f-g8mw-9gvr
2022-06-06T18:15:08Z
2022-05-24T22:14:22Z
null
['CVE-2022-29208']
Segfault and OOB write due to incomplete validation in `EditDistance` in TensorFlow
### Impact The implementation of [`tf.raw_ops.EditDistance`]() has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service: ```python import tensorflow as tf hypothesis_indices = tf.constant(-1250999896764, shape=[3, 3], dtype=tf.int64) hypothesis_values = tf.const...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2r2f-g8mw-9gvr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29208'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/30721cf564cb029d34535446d6a5a6357bebc8e7'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:14:22Z', 'nvd_published_at': '2022-05-20T23:15:00Z'}
1.4.0
GHSA-jwvw-v7c5-m82h
2022-06-17T21:54:16Z
2022-05-13T01:06:54Z
null
['CVE-2015-5237']
protobuf susceptible to buffer overflow
protobuf allows remote authenticated attackers to cause a heap-based buffer overflow.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Google.Protobuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5237'}, {'type': 'WEB', 'url': 'https://github.com/google/protobuf/issues/760'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1256426'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jwvw-v7c5-m82h'}, {'type...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:54:16Z', 'nvd_published_at': '2017-09-25T17:29:00Z'}
1.4.0
GHSA-vhrg-v3cv-p247
2022-07-01T17:12:03Z
2022-05-13T01:02:16Z
null
['CVE-2017-4995']
Deserialization of Untrusted Data in Spring Security
An issue was discovered in Pivotal Spring Security 4.2.0.RELEASE through 4.2.2.RELEASE, and Spring Security 5.0.0.M1. When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execution. Jackson fixed this vulnerability by blacklisting known "deseriali...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0.RELEASE'}, {'fixed': '4.2.3.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.2.RELEASE'}}, {'package': {'ecosystem': 'Maven'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-4995'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4641ed8616ccc2c1fbddac2c3dc9900c96387bc226eaf0232d61909b@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T19:40:27Z', 'nvd_published_at': '2017-11-27T10:29:00Z'}
1.4.0
GHSA-6xmv-mx7q-789r
2023-07-21T20:33:12Z
2022-05-13T01:20:53Z
null
['CVE-2018-8456']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8354, CVE-2018-8391, CVE-2018-8457, CVE-2018-8459.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8456'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5688'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/98360625854f84262ce8de59a7f57496393281f3'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:33:12Z', 'nvd_published_at': '2018-09-13T00:29:00Z'}
1.4.0
GHSA-hmx6-gc2p-5p82
2023-07-19T18:05:17Z
2022-05-13T01:08:15Z
null
['CVE-2019-5919']
Nablarch Incomplete Cryptography
An incomplete cryptography of the data store function by using hidden tag in Nablarch 5 (5, and 5u1 to 5u13) allows remote attackers to obtain information of the stored data, to register invalid value, or alter the value via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.nablarch.framework:nablarch-fw-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5919'}, {'type': 'WEB', 'url': 'https://github.com/nablarch/nablarch-fw-web/pull/53'}, {'type': 'WEB', 'url': 'https://github.com/nablarch/nablarch-fw-web/pull/54'}, {'type': 'WEB', 'url': 'https://nablarch.atlassian.net/browse/NAB-313'}, {'type': ...
{'cwe_ids': ['CWE-327'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T18:05:17Z', 'nvd_published_at': '2019-03-12T22:29:00Z'}
1.4.0
GHSA-rhvg-r9fw-9wqj
2023-07-21T19:23:20Z
2022-05-13T01:20:59Z
null
['CVE-2018-8557']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8557'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5827'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/e73f2fff33c299934df28f2fc87d41aa9e149c50'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:23:20Z', 'nvd_published_at': '2018-11-14T01:29:00Z'}
1.4.0
GHSA-w3p6-94x2-xcvm
2023-08-04T23:08:41Z
2022-05-17T04:03:11Z
null
['CVE-2015-5210']
Apache Ambari Open Redirect
Open redirect vulnerability in Apache Ambari before 2.1.2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the targetURI parameter.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ambari:ambari'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5210'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/AMBARI/Ambari+Vulnerabilities#AmbariVulnerabilities-FixedinAmbari2.1.2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/10/13/4'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T23:08:41Z', 'nvd_published_at': '2015-11-02T19:59:00Z'}
1.4.0
GHSA-m44r-gv6q-9j9r
2023-01-24T16:02:30Z
2022-05-24T17:06:56Z
null
['CVE-2015-2784']
papercrop does not properly handle crop input
The papercrop gem before 0.3.0 for Ruby on Rails does not properly handle crop input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'papercrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2784'}, {'type': 'WEB', 'url': 'https://github.com/rsantamaria/papercrop/commit/b4ecd95debaf0a8712bd1d34def83f41fc6b3579'}, {'type': 'PACKAGE', 'url': 'https://github.com/rsantamaria/papercrop'}, {'type': 'WEB', 'url': 'https://github.com/rsantamar...
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T16:02:30Z', 'nvd_published_at': '2020-01-21T18:15:00Z'}
1.4.0
GHSA-2x9h-h3c4-wqqh
2022-07-06T19:50:21Z
2022-05-14T01:00:43Z
null
['CVE-2016-9299']
Improper Neutralization of Special Elements used in an LDAP Query in Jenkins
The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20'}, {'fixed': '2.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.31'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9299'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!original/jenkinsci-advisories/-fc-w9tNEJE/LZ7EOS0fBgAJ'}, {'type':...
{'cwe_ids': ['CWE-90'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:50:21Z', 'nvd_published_at': '2017-01-12T23:59:00Z'}
1.4.0
GHSA-crg2-6xv3-qg5f
2022-12-22T05:25:16Z
2022-05-24T17:12:40Z
null
['CVE-2020-2162']
Improper Neutralization of Input During Web Page Generation in Jenkins
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier served files uploaded as file parameters to a build without specifying appropriate `Content-Security-Policy HTTP` headers. This resulted in a stored cross-site scripting (XSS) vulnerability exploitable by users with permissions to build a job with file parameters.\n\nJ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.228'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.204.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2162'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1793'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/25/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:58:29Z', 'nvd_published_at': '2020-03-25T17:15:00Z'}
1.4.0
GHSA-46x4-9jmv-jc8p
2023-09-05T20:12:29Z
2022-05-17T03:43:00Z
null
['CVE-2016-2048']
Django Access Restrictions Bypass
Django 1.9.x before 1.9.2, when `ModelAdmin.save_as` is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the "Save as New" option when editing objects and leveraging the "change" permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9'}, {'fixed': '1.9.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2048'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123075529/http://www.securityfocus.com/bid/82329'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211204051406/http://www.securitytracker.com/id/1034894'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:43:10Z', 'nvd_published_at': '2016-02-08T19:59:00Z'}
1.4.0
GHSA-pvhv-qwc8-r2pg
2023-08-29T21:36:24Z
2022-05-17T04:32:23Z
null
['CVE-2012-5501']
Plone Arbitrary File Read
`at_download.py` in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read arbitrary BLOBs (Files and Images) stored on custom content types via a crafted URL.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5501'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:36:24Z', 'nvd_published_at': '2014-09-30T14:55:00Z'}
1.4.0
GHSA-hg5p-233h-c7fh
2022-07-05T22:05:28Z
2022-05-01T17:42:17Z
null
['CVE-2007-0185']
Direct Web Remoting vulnerable to Denial of Service
Getahead Direct Web Remoting (DWR) before 1.1.4 allows attackers to cause a denial of service (memory exhaustion and servlet outage) via unknown vectors related to a large number of calls in a batch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.directwebremoting:dwr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-0185'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/31382'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:05:28Z', 'nvd_published_at': '2007-01-12T05:04:00Z'}
1.4.0
GHSA-5479-gqqr-f9gj
2023-08-16T23:14:19Z
2022-05-17T04:18:00Z
null
['CVE-2014-9509']
Typo3 Vulnerable to Cache Poisoning
**Problem Description:** A request URL with arbitrary arguments, but still pointing to the home page of a TYPO3 installation can be cached if the configuration option `config.prefixLocalAnchors` is used with the values "all" or "cached". The impact of this vulnerability is that unfamiliar looking links to the home pag...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.39'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9509'}, {'type': 'WEB', 'url': 'http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:14:19Z', 'nvd_published_at': '2015-01-04T21:59:00Z'}
1.4.0
GHSA-xhw3-wmx2-76wf
2022-12-02T21:02:51Z
2022-05-18T00:00:39Z
null
['CVE-2022-30950']
Buffer overflow in Jenkins WMI Windows Agents plugin
WMI Windows Agents Plugin 1.8 and earlier includes the Windows Remote Command library. It provides a general-purpose remote command execution capability that Jenkins uses to check if Java is available, and if not, to install it. This library has a buffer overflow vulnerability that may allow users able to connect to a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:windows-slaves'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30950'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/windows-slaves-plugin/commit/4638cf0e56caf839eadfdf0fab545abd2a9ac65e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/windows-slaves-plugin'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-120'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T15:50:29Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-294j-r53x-w786
2023-07-31T19:13:44Z
2022-05-14T02:23:11Z
null
['CVE-2016-3389']
ChakraCore RCE Vulnerability
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3386, CVE-2016-7190, and CVE-2016-7194.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3389'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1737'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f05c42e64c3b2d057ae1a52fe1917af26c9f2737'}, {'type': 'WEB', 'url': 'https://docs.microso...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:13:44Z', 'nvd_published_at': '2016-10-14T02:59:00Z'}
1.4.0
GHSA-8936-44gw-7664
2023-02-08T17:58:53Z
2022-05-17T03:56:29Z
null
['CVE-2015-5271']
TripleO Heat templates might allow remote attackers to obtain sensitive information from private containers
The TripleO Heat templates (tripleo-heat-templates) do not properly order the Identity Service (keystone) before the OpenStack Object Storage (Swift) staticweb middleware in the swiftproxy pipeline when the staticweb middleware is enabled, which might allow remote attackers to obtain sensitive information from private ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tripleo-heat-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5271'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:1862'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2015-5271'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/tripleo/+bug/1494896'}, {'type': '...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:58:53Z', 'nvd_published_at': '2016-04-15T17:59:00Z'}
1.4.0
GHSA-545f-pgp7-fwjf
2022-06-01T21:14:49Z
2022-05-17T00:00:33Z
null
['CVE-2021-23266']
Log value insertion in craftercms
An anonymous user can craft a URL with text that ends up in the log viewer as is. The text can then include textual messages to mislead the administrator.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:craftercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23266'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2022051602'}]
{'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:14:49Z', 'nvd_published_at': '2022-05-16T17:15:00Z'}
1.4.0
GHSA-ffr6-8cv5-j637
2023-01-06T17:07:28Z
2022-05-24T17:08:46Z
null
['CVE-2020-2114']
Jenkins S3 Publisher Plugin transmits credentials in plain text during configuration
S3 Publisher Plugin stores a secret key in its global configuration. While the credential is stored encrypted on disk, it is transmitted in plain text as part of the configuration form by S3 publisher Plugin 0.11.4 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripti...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.11.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2114'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/s3-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1684'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02/12/3'...
{'cwe_ids': ['CWE-319'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T17:07:28Z', 'nvd_published_at': '2020-02-12T15:15:00Z'}
1.4.0
GHSA-r68f-45jg-64m6
2023-09-25T18:50:10Z
2022-05-24T16:52:27Z
null
['CVE-2019-7927']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to edit product content pages to inject malicious javascript.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7927'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:54:39Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-vf6r-mmhc-3xcm
2022-06-29T19:11:47Z
2022-05-13T01:12:21Z
null
['CVE-2018-14642']
Exposure of Sensitive Information to an Unauthorized Actor in Undertow
An information leak vulnerability was found in Undertow. If all headers are not written out in the first write() call then the code that handles flushing the buffer will always write out the full contents of the writevBuffer buffer, which may contain data from previous requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.19.FINAL'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.18.FINAL'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14642'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0362'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0364'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0365'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T19:11:47Z', 'nvd_published_at': '2018-09-18T13:29:00Z'}
1.4.0
GHSA-pfrc-5hhq-6hvr
2023-07-24T20:42:30Z
2022-05-13T01:50:52Z
null
['CVE-2018-19620']
Showdoc Unauthenticated Access
ShowDoc 2.4.1 allows remote attackers to edit other users' notes by navigating with a modified `page_id`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19620'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/issues/397'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/bcdb5e3519285bdf81e618b3c9b90d22bc49e13c'}, {'type': 'WEB', 'url': 'https://github.com/CCCCCrash/POC...
{'cwe_ids': ['CWE-425'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T20:42:30Z', 'nvd_published_at': '2018-11-28T08:29:00Z'}
1.4.0
GHSA-8q2m-pwxf-jc7g
2023-08-04T21:53:49Z
2022-05-17T00:55:33Z
null
['CVE-2013-2013']
python-keystoneclient unsecure user password update
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-keystoneclient'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2013'}, {'type': 'WEB', 'url': 'https://github.com/openstack/python-keystoneclient/commit/f2e0818bc97bfbeba83f6abbb07909a8debcad77'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/python-keystoneclient/+bug/938315'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:53:49Z', 'nvd_published_at': '2013-10-01T20:55:00Z'}
1.4.0
GHSA-w3r8-fxv5-58pp
2023-07-17T20:38:20Z
2022-05-24T16:52:26Z
null
['CVE-2019-7892']
Magento 2 Community Edition RCE Vulnerability via SSRF
A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with administrator privileges to access shipment settings can execute arbitrary code via server-side request forgery.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7892'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:38:20Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-pxgq-gqr9-5gwx
2022-12-13T15:18:39Z
2022-05-24T17:39:13Z
null
['CVE-2021-21605']
Path traversal vulnerability in Jenkins agent names
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override unrelated `config.xml` files. If the global `config.xml` file is replaced, Jenkins will start up with unsafe legacy defaults after a restart. Jenkins 2.275, LTS 2.263.2 e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.263.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.264'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21605'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2021'}]
{'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:51:44Z', 'nvd_published_at': '2021-01-13T16:15:00Z'}
1.4.0
GHSA-8c82-9rgp-4qvr
2022-06-30T19:49:41Z
2022-05-14T02:45:32Z
null
['CVE-2017-9802']
Improper Neutralization of Input During Web Page Generation Apache Sling Servlets Post
The Javascript method Sling.evalString() in Apache Sling Servlets Post before 2.3.22 uses the javascript 'eval' function to parse input strings, which allows for XSS attacks by passing specially crafted input strings.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.servlets.post'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9802'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-7041'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2f4b8333e44c6e7e0b00933bd4204ce64829952f60dbb6814f2cdf91@%3Cdev.sling.apache.org%3E'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T19:49:41Z', 'nvd_published_at': '2017-08-14T13:29:00Z'}
1.4.0
GHSA-pcf7-5974-vjh4
2023-07-25T19:21:06Z
2022-05-14T02:20:16Z
null
['CVE-2018-15601']
Elefant CMS Improper Input Validation
`apps/filemanager/handlers/upload/drop.php` in Elefant CMS 2.0.3 performs a urldecode step too late in the "Cannot upload executable files" protection mechanism.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15601'}, {'type': 'WEB', 'url': 'https://github.com/jbroadway/elefant/commit/afb3346e50b992bcba143660ca2149e563430e05'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:21:06Z', 'nvd_published_at': '2018-08-21T02:29:00Z'}
1.4.0
GHSA-8x8p-mfwv-9fjw
2023-02-08T18:01:50Z
2022-05-17T03:53:31Z
null
['CVE-2014-3680']
Jenkins Exposure of Sensitive Information to an Unauthorized Actor vulnerability
Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Job/READ permission to obtain the default value for the password field of a parameterized job by reading the DOM.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.566'}, {'fixed': '1.583'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3680'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0070'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-3680'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1148645'}, {'type...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:01:50Z', 'nvd_published_at': '2014-10-16T19:55:00Z'}
1.4.0
GHSA-5xm9-rf63-wj7h
2022-07-13T17:56:38Z
2022-05-17T05:18:15Z
null
['CVE-2011-2732']
Improper Control of Generation of Code in Spring Security
CRLF injection vulnerability in the logout functionality in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the spring-security-redirect parameter.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'ev...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2732'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security'}, {'type': 'WEB', 'url': 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814'}, {'type': 'WEB', 'url': 'http://support.springsource.com/security/cve-2011-2...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:56:38Z', 'nvd_published_at': '2012-12-05T17:55:00Z'}
1.4.0
GHSA-hrf4-ww4w-6rv6
2023-07-27T19:24:02Z
2022-05-17T00:32:27Z
null
['CVE-2017-11797']
ChakraCore RCE Vulnerability
ChakraCore allows an attacker to execute arbitrary code in the context of the current user, due to how the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11798, CVE-20...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11797'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/3917'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/9a3ad7ccba1fae1549e21369982d59d45a2ab6cf'}, {'type': 'WEB', 'url': 'https://portal.msrc...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:24:02Z', 'nvd_published_at': '2017-10-13T13:29:00Z'}
1.4.0
GHSA-c4r2-3f9r-rwp8
2023-09-26T18:05:26Z
2022-05-24T17:00:24Z
null
['CVE-2019-8113']
Magento 2 Community Weak PRNG
Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1 uses cryptographically weak random number generator to brute-force the confirmation code for customer registration.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8113'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:05:29Z', 'nvd_published_at': '2019-11-05T23:15:00Z'}
1.4.0
GHSA-px42-mr8m-cpgh
2023-08-07T20:27:41Z
2022-05-17T19:57:06Z
null
['CVE-2014-3656']
JBoss KeyCloak Cross-site Scripting Vulnerability
If a JBoss Keycloak application was configured to use `*` as a permitted web origin in the Keycloak administrative console, crafted requests to the `login-status-iframe.html` endpoint could inject arbitrary Javascript into the generated HTML code via the "origin" query parameter, leading to a cross-site scripting (XSS)...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0.Beta1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3656'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/63b41e2548cbc20bd3758e34a82d880e177bf24c'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2014-3656'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat....
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T20:27:41Z', 'nvd_published_at': '2019-12-10T14:15:00Z'}
1.4.0
GHSA-23fm-v895-3qxq
2023-07-13T19:03:27Z
2022-05-24T17:22:31Z
null
['CVE-2020-15514']
jh_captcha for Typo3 XSS Vulnerability
The jh_captcha extension through 2.1.3, and 3.x through 3.0.2, for TYPO3 allows XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'haffner/jh_captcha'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.2'}}, {'package': {'ecosystem': 'Packagist', 'name': 'haffner/jh_captcha'}, 'ranges': [{'t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15514'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-012'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T19:03:27Z', 'nvd_published_at': '2020-07-07T14:15:00Z'}
1.4.0
GHSA-2g56-7jv7-wxxq
2022-07-08T19:39:44Z
2022-05-14T01:37:06Z
null
['CVE-2013-5960']
Missing Cryptographic Step in OWASP Enterprise Security API for Java
The authenticated-encryption feature in the symmetric-encryption implementation in the OWASP Enterprise Security API (ESAPI) for Java 2.x before 2.1.0.1 does not properly resist tampering with serialized ciphertext, which makes it easier for remote attackers to bypass intended cryptographic protection mechanisms via an...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.esapi:esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0.0'}, {'fixed': '2.1.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5960'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/issues/359'}, {'type': 'WEB', 'url': 'https://github.com/esapi/esapi-java-legacy/issues/306'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/blob/master...
{'cwe_ids': ['CWE-325'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:39:44Z', 'nvd_published_at': '2013-09-30T17:09:00Z'}
1.4.0
GHSA-qpr7-5m63-hq2c
2022-07-07T23:25:29Z
2022-05-14T02:54:05Z
null
['CVE-2013-6235']
Improper Neutralization of Input During Web Page Generation in JAMon
Multiple cross-site scripting (XSS) vulnerabilities in JAMon (Java Application Monitor) 2.7 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) listenertype or (2) currentlistener parameter to mondetail.jsp or ArraySQL parameter to (3) mondetail.jsp, (4) jamonadmin.jsp, (5) sql.jsp, or...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.jamonapi:jamon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.80'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6235'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/90699'}, {'type': 'WEB', 'url': 'http://osvdb.org/102570'}, {'type': 'WEB', 'url': 'http://osvdb.org/102571'}, {'type': 'WEB', 'url': 'http://osvdb.org/102572'}, {...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:25:29Z', 'nvd_published_at': '2014-01-31T15:07:00Z'}
1.4.0
GHSA-h798-h7ff-93xv
2023-08-01T20:29:54Z
2022-05-13T01:12:46Z
null
['CVE-2015-3175']
Moodle Arbitrary Redirect
Multiple open redirect vulnerabilities in Moodle through 2.5.9, 2.6.x before 2.6.11, 2.7.x before 2.7.8, and 2.8.x before 2.8.6 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving an error page that links to a URL from an HTTP Referer header.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6'}, {'fixed': '2.6.11'}]}]}, ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3175'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/b2687a055dc990ca86ddce178d5aee3fb1df644a'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/dd0607b7bbaff38cc62e4d00658c02da3fdbb4c8'}, {'type': 'WEB', 'url': '...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T20:29:54Z', 'nvd_published_at': '2015-06-01T19:59:00Z'}
1.4.0
GHSA-xfrw-pcmc-r2p3
2022-12-15T17:25:38Z
2022-05-24T17:45:46Z
null
['CVE-2021-21632']
Missing permission checks in Jenkins OWASP Dependency-Track Plugin allow capturing credentials
OWASP Dependency-Track Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing \"Secret text\" credentials stored...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dependency-track'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21632'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dependency-track-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2250'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:25:38Z', 'nvd_published_at': '2021-03-30T12:16:00Z'}
1.4.0
GHSA-5wc4-w63v-97c3
2022-12-15T16:48:02Z
2022-05-24T19:12:36Z
null
['CVE-2021-21680']
XXE vulnerability in Jenkins Nested View Plugin
Nested View Plugin 1.20 and earlier does not configure its XML transformer to prevent XML external entity (XXE) attacks. This allows attackers able to configure views to have Jenkins parse a crafted view XML definition that uses external entities for extraction of secrets from the Jenkins controller or server-side req...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nested-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.20'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21680'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/nested-view-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-08-31/#SECURITY-2411'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T16:48:02Z', 'nvd_published_at': '2021-08-31T14:15:00Z'}
1.4.0
GHSA-f25h-3mj6-4jpg
2023-01-23T14:44:47Z
2022-05-17T04:55:27Z
null
['CVE-2013-7249']
Fat Free CRM vulnerable to Exposure of Sensitive Information
Fat Free CRM before 0.12.1 does not restrict XML serialization, which allows remote attackers to obtain sensitive information via a direct request, as demonstrated by a request for `users/1.xml`, a different vulnerability than CVE-2013-7224.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7249'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/issues/300'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/cf26a04b356ad2161c4c6160260eb870a3de5328'}, {'type': 'PACKAGE', 'url': 'https://githu...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T14:44:47Z', 'nvd_published_at': '2014-01-02T14:59:00Z'}
1.4.0
GHSA-2xjx-v99w-gqf3
2022-07-08T19:27:45Z
2022-05-14T01:41:10Z
null
['CVE-2019-0545']
Exposure of Sensitive Information in System.Net.Http
An information disclosure vulnerability exists in .NET Framework and .NET Core which allows bypassing Cross-origin Resource Sharing (CORS) configurations, aka ".NET Framework Information Disclosure Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.6.2/4....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.7'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0545'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/94'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0040'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/adviso...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:27:45Z', 'nvd_published_at': '2019-01-08T21:29:00Z'}
1.4.0
GHSA-f9v6-p7hp-c3qx
2023-01-14T05:22:07Z
2022-05-24T17:10:28Z
null
['CVE-2020-2142']
Missing permission checks in Jenkins P4 Plugin
A missing permission check in Jenkins P4 Plugin 1.10.10 and earlier allows attackers with Overall/Read permission to trigger builds or add labels in the Perforce repository. P4 Plugin 1.10.11 appropriate user permissions for the affected HTTP endpoints.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:p4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2142'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/p4-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1765'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/09/1'...
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:22:07Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}
1.4.0
GHSA-6cr4-7c7p-p3xv
2022-07-13T18:30:02Z
2022-05-14T01:17:03Z
null
['CVE-2011-5064']
Use of Hard-coded Cryptographic Key in Apache Tomcat
DigestAuthenticator.java in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server secret (aka private key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by lev...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-5064'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:30:02Z', 'nvd_published_at': '2012-01-14T21:55:00Z'}
1.4.0
GHSA-8rjr-6qq5-pj9p
2023-07-28T20:46:52Z
2022-05-14T00:59:49Z
null
['CVE-2016-1494']
Python RSA allows attackers to spoof signatures
The verify function in the RSA package for Python (Python-RSA) before 3.3 allows attackers to spoof signatures with a small public exponent via crafted signature padding, aka a BERserk attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rsa'}, 'ecosystem_specific': {'affected_functions': ['verify', 'rsa.pkcs1.verify(message, signature, pub_key):', 'rsa.pkcs1._find_method_hash']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1494'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/commit/ab5d21c3b554f926d51ff3ad9c794bcf32e95b3c'}, {'type': 'WEB', 'url': 'https://bitbucket.org/sybren/python-rsa/pull-requests/14/security-fix-bb06-attack-in-verify-by/dif...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:46:52Z', 'nvd_published_at': '2016-01-13T15:59:00Z'}
1.4.0
GHSA-9m72-pw47-292w
2023-07-21T18:11:26Z
2022-05-13T01:19:30Z
null
['CVE-2018-17856']
Joomla RCE Vulnerability
An issue was discovered in Joomla! before 3.8.13. com_joomlaupdate allows the execution of arbitrary code. The default ACL config enabled the ability of Administrator-level users to access com_joomlaupdate and trigger code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'joomla/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.4'}, {'fixed': '3.8.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.12'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17856'}, {'type': 'WEB', 'url': 'https://developer.joomla.org/security-centre/752-20181002-core-inadequate-default-access-level-for-com-joomlaupdate.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/joomla/joomla-cms'}, {'type': 'WEB', 'url': ...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T18:11:26Z', 'nvd_published_at': '2018-10-09T21:29:00Z'}
1.4.0
GHSA-4wrr-9h5r-m92w
2023-08-29T20:37:05Z
2022-05-04T00:29:43Z
null
['CVE-2012-0391']
Apache Struts Remote Java Code Execution
The `ExceptionDelegator` component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0391'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/commit/25e50069d60434a30395e3a98357ffba2bed427e'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/WW-3668'}, {'type': 'WEB', 'url': 'https://www.sec-consult.com/files/2...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T20:37:05Z', 'nvd_published_at': '2012-01-08T15:55:00Z'}
1.4.0
GHSA-v2fp-h4qx-x3r6
2022-11-01T22:26:52Z
2022-05-17T05:18:47Z
null
['CVE-2012-1154']
Improper Access Control in JBoss mod_cluster
mod_cluster 1.0.10 before 1.0.10 CP03 and 1.1.x before 1.1.4, as used in JBoss Enterprise Application Platform 5.1.2, when "ROOT" is set to excludedContexts, exposes the root context of the server, which allows remote attackers to bypass access restrictions and gain access to applications deployed on the root context v...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.mod_cluster:mod_cluster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1154'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=802200'}, {'type': 'WEB', 'url': 'https://community.jboss.org/message/624018'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/MODCLUSTER-253'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:26:52Z', 'nvd_published_at': '2012-10-22T23:55:00Z'}
1.4.0
GHSA-4qf5-7xc2-wqpg
2023-07-13T17:06:07Z
2022-05-24T17:09:34Z
null
['CVE-2020-5187']
DNN Path Traversal via Zip Slip
DNN (formerly DotNetNuke) through 9.4.4 allows Path Traversal via unsafe handling of zip files
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5187'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/releases'}, {'type': 'WEB', 'url': 'https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-secure-as-you-think-e8516f789175'}, {'type': 'WEB', 'url': 'http://packetsto...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:06:07Z', 'nvd_published_at': '2020-02-24T15:15:00Z'}
1.4.0
GHSA-9xfc-j5mf-9w5p
2022-06-20T22:24:50Z
2022-05-17T02:49:31Z
null
['CVE-2016-6348']
JacksonJsonpInterceptor susceptible to cross-site script inclusion (XSSI) attack
JacksonJsonpInterceptor in RESTEasy might allow remote attackers to conduct a cross-site script inclusion (XSSI) attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.20.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6348'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1372129'}, {'type': 'PACKAGE', 'url': 'https://github.com/resteasy/Resteasy'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:24:50Z', 'nvd_published_at': '2017-04-12T22:59:00Z'}
1.4.0
GHSA-2j5w-cwc3-8hxw
2022-11-01T22:49:48Z
2022-05-24T17:03:47Z
null
['CVE-2019-16558']
Improper Certificate Validation in Jenkins Spira Importer Plugin
Jenkins Spira Importer Plugin 3.2.3 and earlier disables SSL/TLS certificate validation for the Jenkins master JVM.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.inflectra.spiratest.plugins:inflectra-spira-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16558'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1580'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:49:48Z', 'nvd_published_at': '2019-12-17T15:15:00Z'}
1.4.0
GHSA-j7j6-7hfx-5522
2022-06-27T16:10:41Z
2022-05-24T17:07:06Z
null
['CVE-2019-16792']
Inconsistent Interpretation of HTTP Requests in Waitress
Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16792'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T16:10:41Z', 'nvd_published_at': '2020-01-22T19:15:00Z'}
1.4.0
GHSA-vqp8-h53h-3jfh
2022-12-29T00:27:18Z
2022-05-24T17:22:18Z
null
['CVE-2020-2205']
Stored XSS vulnerability in Jenkins VncRecorder Plugin
VncRecorder Plugin 1.25 and earlier does not escape a tool path in the `checkVncServ` form validation endpoint accessed e.g. via job configuration forms. This results in a stored cross-site scripting (XSS) vulnerability exploitable by Jenkins administrators. VncRecorder Plugin 1.35 escapes the tool path.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vncrecorder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.35'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.25'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2205'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vncrecorder-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1728%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securit...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T00:27:18Z', 'nvd_published_at': '2020-07-02T15:15:00Z'}
1.4.0
GHSA-6r5v-hp32-fjqw
2022-07-06T20:29:35Z
2022-05-14T02:57:28Z
null
['CVE-2015-0227']
Improper Access Control in Apache WSS4J
Apache WSS4J before 1.6.17 and 2.x before 2.0.2 allows remote attackers to bypass the requireSignedEncryptedDataElements configuration via a vectors related to "wrapping attacks."
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ws.security:wss4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.ws.security:wss4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0227'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/100837'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03900en_us'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:29:35Z', 'nvd_published_at': '2015-02-12T16:59:00Z'}
1.4.0
GHSA-98vc-98q7-57qf
2023-07-31T22:07:51Z
2022-05-17T02:45:41Z
null
['CVE-2017-7888']
Dolibarr ERP and CRM Insecure Encryption
Dolibarr ERP/CRM 4.0.4 stores passwords with the MD5 algorithm, which makes brute-force attacks easier.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7888'}, {'type': 'WEB', 'url': 'https://www.foxmole.com/advisories/foxmole-2017-02-23.txt'}]
{'cwe_ids': ['CWE-326'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:07:51Z', 'nvd_published_at': '2017-05-10T14:29:00Z'}
1.4.0
GHSA-9m48-54pj-h248
2022-06-28T22:30:13Z
2022-05-24T16:55:01Z
null
['CVE-2019-10383']
Improper Neutralization of Input During Web Page Generation in Jenkins
A stored cross-site scripting vulnerability in Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed attackers with Overall/Administer permission to configure the update site URL to inject arbitrary HTML and JavaScript in update center web pages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.176.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.176.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10383'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2789'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3144'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1453'},...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:30:13Z', 'nvd_published_at': '2019-08-28T16:15:00Z'}
1.4.0
GHSA-rj8f-g5gm-jw5c
2023-08-01T22:57:24Z
2022-05-24T16:52:25Z
null
['CVE-2019-7887']
Magento 2 Community Edition Cross-site Scripting Vulnerability
A reflected cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 when the feature that adds a secret key to the Admin URL is disabled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7887'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:57:24Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-gghc-g8cj-4vfv
2022-12-15T17:36:30Z
2022-05-24T19:16:59Z
null
['CVE-2021-21684']
Stored XSS vulnerability in Jenkins Git Plugin
Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted commit notifications to the `/git/notifyCommit` endpoi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.8.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21684'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2499'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10...
{'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:36:30Z', 'nvd_published_at': '2021-10-06T23:15:00Z'}
1.4.0
GHSA-vwqh-cmvp-6694
2023-07-21T20:19:14Z
2022-05-13T01:20:45Z
null
['CVE-2018-8286']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8280, CVE-2018-8290, CVE-2018-8294.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8286'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5444'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/0ac4253cbc2d7f63e638a4930b552814bd64aa5d'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:19:14Z', 'nvd_published_at': '2018-07-11T00:29:00Z'}
1.4.0
GHSA-mr5m-2385-2vcp
2023-07-17T18:29:36Z
2022-05-24T17:13:39Z
null
['CVE-2020-11610']
xdlocalstorage does not verify request origin
An issue was discovered in xdLocalStorage through 2.0.5. The `postData()` function in `xdLocalStoragePostMessageApi.js` specifies the wildcard (`*`) as the targetOrigin when calling the `postMessage()` function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'xdlocalstorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11610'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19'}, {'type': 'PACKAGE', 'url': 'https://github.com/ofirdaga...
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T18:29:36Z', 'nvd_published_at': '2020-04-07T18:15:00Z'}
1.4.0
GHSA-m5pm-rgvf-vg22
2022-11-22T18:56:58Z
2022-05-17T02:28:11Z
null
['CVE-2017-7666']
Apache OpenMeetings vulnerable to Cross-Site Request Forgery
Apache OpenMeetings 1.0.0 is vulnerable to Cross-Site Request Forgery (CSRF) attacks, XSS attacks, click-jacking, and MIME based attacks. The issue is fixed in version 3.3.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7666'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/fkesu4e5hhz5xdbg'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:56:58Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-4gqp-296r-j5mq
2023-02-08T17:58:05Z
2022-05-14T01:53:10Z
null
['CVE-2016-5003']
Apache XML-RPC vulnerable to Deserialization of Untrusted Data
The Apache XML-RPC (aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote attackers to execute arbitrary code via a crafted serialized Java object in an <ex:serializable> element.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlrpc:xmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5003'}, {'type': 'WEB', 'url': 'https://0ang3el.blogspot.ru/2016/07/beware-of-ws-xmlrpc-library-in-your.html'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1779'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:58:05Z', 'nvd_published_at': '2017-10-27T18:29:00Z'}
1.4.0
GHSA-mj48-f959-pqph
2023-08-29T18:14:44Z
2022-05-17T04:49:44Z
null
['CVE-2013-7335']
DotNetNuke (DNN) Open redirect vulnerability
Open redirect vulnerability in DotNetNuke (DNN) before 6.2.9 and 7.x before 7.1.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7335'}, {'type': 'PACKAGE', 'url': 'https://github.com/dnnsoftware/Dnn.Platform'}, {'type': 'WEB', 'url': 'http://www.dnnsoftware.com/platform/manage/security-center'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/61809'}]
{'cwe_ids': ['CWE-20', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:14:44Z', 'nvd_published_at': '2014-03-12T14:55:00Z'}
1.4.0
GHSA-5whw-5cmm-9jw4
2023-08-29T21:36:49Z
2022-05-17T04:32:23Z
null
['CVE-2012-5504']
Plone Cross-site scripting Vulnerability
Cross-site scripting (XSS) vulnerability in widget_traversal.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5504'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:36:49Z', 'nvd_published_at': '2014-09-30T14:55:00Z'}
1.4.0
GHSA-q6w2-jxcm-2crj
2022-06-09T23:51:03Z
2022-05-17T05:47:38Z
null
['CVE-2008-7263']
Improper Authentication in pyftpdlib
ftpserver.py in pyftpdlib before 0.5.0 does not delay its response after receiving an invalid login attempt, which makes it easier for remote attackers to obtain access via a brute-force attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-7263'}, {'type': 'WEB', 'url': 'https://github.com/giampaolo/pyftpdlib/issues/73'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q6w2-jxcm-2crj'}, {'type': 'PACKAGE', 'url': 'https://github.com/giampaolo/pyftpdlib'}, {'type': 'WE...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:51:03Z', 'nvd_published_at': '2010-10-19T20:00:00Z'}
1.4.0
GHSA-j984-q4qc-6qxf
2023-08-04T23:10:05Z
2022-05-17T03:50:02Z
null
['CVE-2015-7558']
librsvg DoS via Cyclic References
librsvg before 2.40.12 allows context-dependent attackers to cause a denial of service (infinite loop, stack consumption, and application crash) via cyclic references in an SVG document.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'librsvg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.40.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7558'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1268243'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/librsvg/commit/?id=a51919f7e1ca9c535390a746fbf6e28c8402dc61'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T23:10:05Z', 'nvd_published_at': '2016-05-20T14:59:00Z'}
1.4.0
GHSA-264w-xrr7-6qqg
2022-12-28T23:19:17Z
2022-05-24T17:12:40Z
null
['CVE-2020-2167']
RCE vulnerability in Jenkins OpenShift Pipeline Plugin
OpenShift Pipeline Plugin 1.0.56 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to OpenShift Pipeline Plugin’s build step. OpenShift Pipeline Plugin 1.0.57 c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.openshift.jenkins:openshift-pipeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.57'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.56'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2167'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/openshift-pipeline-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1739'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T23:19:17Z', 'nvd_published_at': '2020-03-25T17:15:00Z'}
1.4.0
GHSA-43qp-hphf-5rjw
2023-07-27T19:39:18Z
2022-05-17T00:19:54Z
null
['CVE-2017-11871']
Chakra Core Privilege Escalation
ChakraCore and Microsoft Edge in Windows 10 1703, 1709, and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11871'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4226'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/9d211a417757ba1ddcd0f2e72d9553535256107e'}, {'type': 'WEB', 'url': 'https://portal.msrc...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:39:18Z', 'nvd_published_at': '2017-11-15T03:29:00Z'}
1.4.0
GHSA-6mpp-cm3v-23vv
2022-12-14T16:21:33Z
2022-05-24T19:04:53Z
null
['CVE-2021-21663']
Missing permission check in Jenkins XebiaLabs XL Deploy Plugin allows capturing credentials
A missing permission check in Jenkins XebiaLabs XL Deploy Plugin 7.5.8 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing Username/password credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.xebialabs.deployit.ci:deployit-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21663'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xldeploy-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-1982'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T16:21:33Z', 'nvd_published_at': '2021-06-10T15:15:00Z'}
1.4.0
GHSA-79rm-f26g-296p
2023-03-03T22:59:11Z
2022-05-24T16:51:51Z
null
['CVE-2019-10360']
Jenkins Maven Release Plugin vulnerable to Cross-site Scripting
Maven Release Plug-in Plugin did not properly escape variables in multiple views, resulting in a stored cross-site scripting vulnerability. Variables on affected views are now escaped.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.m2release:m2release'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10360'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/07/31/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:59:11Z', 'nvd_published_at': '2019-07-31T13:15:00Z'}
1.4.0
GHSA-cx5r-p4vj-2mqh
2023-03-03T23:14:54Z
2022-05-24T16:52:46Z
null
['CVE-2019-10373']
Jenkins Build Pipeline Plugin vulnerable to Cross-site Scripting
Build Pipeline Plugin does not properly escape variables in views, resulting in a stored cross-site scripting vulnerability exploitable by users with permission to configure build pipelines. This vulnerability is only exploitable on Jenkins releases older than 2.146 or 2.138.2 due to the security hardening implemented...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-pipeline-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10373'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-07/#SECURITY-879'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/08/07/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:14:54Z', 'nvd_published_at': '2019-08-07T15:15:00Z'}
1.4.0
GHSA-pf27-929j-9pmm
2022-06-24T01:23:52Z
2022-05-24T17:27:38Z
null
['CVE-2020-1912']
Out-of-bounds Read and Out-of-bounds Write in Facebook Hermes
An out-of-bounds read/write vulnerability when executing lazily compiled inner generator functions in Facebook Hermes prior to commit 091835377369c8fd5917d9b87acffa721ad2a168 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hermes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1912'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/commit/091835377369c8fd5917d9b87acffa721ad2a168'}, {'type': 'WEB', 'url': 'https://www.facebook.com/security/advisories/cve-2020-1912'}]
{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:23:52Z', 'nvd_published_at': '2020-09-09T19:15:00Z'}
1.4.0
GHSA-q7jx-r75r-hgj2
2022-12-12T21:30:54Z
2022-05-14T03:23:50Z
null
['CVE-2018-1000144']
Jenkins Cucumber Living Documentation Plugin Cross-site Scripting vulnerability
A cross site scripting vulnerability exists in Jenkins Cucumber Living Documentation Plugin 1.0.12 and older in CukedoctorBaseAction#doDynamic that disables the Content-Security-Policy protection for archived artifacts and workspace files, allowing attackers able to control the content of these files to attack Jenkins ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cucumber-living-documentation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.12'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000144'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cucumber-living-documentation-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-308'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:30:54Z', 'nvd_published_at': '2018-04-05T13:29:00Z'}
1.4.0
GHSA-79hg-357g-rrgv
2023-07-22T00:08:05Z
2022-05-14T00:55:28Z
null
['CVE-2018-19271']
Centreon SQL Injection
Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.28) allows SQL Injection via the main.php searchH parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '18.10.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19271'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6625'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-22T00:08:05Z', 'nvd_published_at': '2018-11-14T11:29:00Z'}
1.4.0
GHSA-c2hg-2jj6-h8vh
2022-12-20T21:29:22Z
2022-05-24T17:25:25Z
null
['CVE-2020-2235']
CSRF vulnerability in Jenkins Pipeline Maven Integration Plugin allow capturing credentials
Pipeline Maven Integration Plugin 3.8.2 and earlier does not perform a permission check in a method implementing form validation. This allows users with Overall/Read access to Jenkins to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capt...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-maven'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2235'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-maven-plugin/'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1794%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T21:29:22Z', 'nvd_published_at': '2020-08-12T14:15:00Z'}
1.4.0
GHSA-4793-8wwh-jxxr
2022-06-06T21:19:22Z
2022-05-25T00:00:37Z
null
['CVE-2022-1848']
Business Logic Errors in Para
Paraara prior to version 1.46.0 is vulnerable to business logic errors. A user can create more than one app, even after they reach the app limit.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.erudika:para-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.46.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1848'}, {'type': 'WEB', 'url': 'https://github.com/erudika/para/commit/fa677c629842df60099daa9c23bd802bc41b48d1'}, {'type': 'PACKAGE', 'url': 'https://github.com/erudika/para'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8dfe0877-e44b-4a1a-...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:19:22Z', 'nvd_published_at': '2022-05-24T13:15:00Z'}
1.4.0
GHSA-qhxf-m7jm-jc57
2023-01-14T05:26:30Z
2022-05-24T17:08:46Z
null
['CVE-2020-2116']
CSRF vulnerability in Pipeline GitHub Notify Step Plugin allows capturing credentials
A cross-site request forgery vulnerability in Jenkins Pipeline GitHub Notify Step Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-githubnotify-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2116'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-githubnotify-step-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-812%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lis...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:26:30Z', 'nvd_published_at': '2020-02-12T15:15:00Z'}
1.4.0
GHSA-7xfj-4jpg-58vf
2023-07-25T17:52:15Z
2022-05-14T01:53:42Z
null
['CVE-2018-18530']
ThinkPHP SQLi Vulnerability
ThinkPHP 5.1.25 has SQL Injection via the count parameter because the library/think/db/Query.php aggregate function mishandles the aggregate variable. NOTE: a backquote character is required in the attack URI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.25'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18530'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2613'}, {'type': 'WEB', 'url': 'https://www.kingkk.com/2018/10/Thinkphp-%E8%81%9A%E5%90%88%E6%9F%A5%E8%AF%A2%E6%BC%8F%E6%B4%9E/#ThinkPHP5-lt-5-1-25'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T17:52:15Z', 'nvd_published_at': '2018-10-19T20:29:00Z'}
1.4.0
GHSA-w5q4-q7wp-qww6
2023-07-31T19:59:16Z
2022-05-24T16:48:16Z
null
['CVE-2019-12823']
Craft CMS XSS Vulnerability
Craft CMS before 3.1.31 does not properly filter XML feeds, thus allowing XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12823'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/6432eca59b93bcea2ca2616199e5d419447e613f'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/6432eca5...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:59:16Z', 'nvd_published_at': '2019-06-18T13:15:00Z'}
1.4.0
GHSA-5whg-j5fv-xcm2
2023-07-28T20:27:48Z
2022-05-14T02:22:42Z
null
['CVE-2016-7200']
ChakraCore RCE Vulnerability
The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7201, CVE-2016-7202, CVE-2016-7203, CVE-2016...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7200'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1982'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c2787ef8fdb7401922e9ec6540e4e5895d11c631'}, {'type': 'WEB', 'url': 'https://docs.microso...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:27:48Z', 'nvd_published_at': '2016-11-10T06:59:00Z'}
1.4.0
GHSA-236h-r3w7-c85c
2022-11-04T18:41:07Z
2022-05-13T01:30:22Z
null
['CVE-2017-3151']
Cross-site Scripting in Apache Atlas
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Stored Cross-Site Scripting in the edit-tag functionality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:atlas-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1-incubating'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3151'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/atlas'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4a4fef91e067fd0d9da569e30867c1fa65e2a0520acde71ddefee0ea@%3Cdev.atlas.apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:41:07Z', 'nvd_published_at': '2017-08-29T20:29:00Z'}
1.4.0
GHSA-x55p-6526-xmmp
2022-07-01T17:49:58Z
2022-05-13T01:36:54Z
null
['CVE-2017-2603']
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
Jenkins before versions 2.44 and 2.32.2 is vulnerable to a user data leak in disconnected agents' config.xml API. This could leak sensitive data such as API tokens (SECURITY-362).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.32.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2603'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/3cd946cbef82c6da5ccccf3890d0ae4e091c4265'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2603'}, {'type': 'PACKAGE', 'url': 'https://github....
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:49:58Z', 'nvd_published_at': '2018-05-15T21:29:00Z'}
1.4.0
GHSA-vj95-2f9q-x7h6
2023-07-19T23:40:28Z
2022-05-24T16:48:34Z
null
['CVE-2018-15747']
glot-code-runner RCE
The default configuration of glot-www through 2018-05-19 allows remote attackers to execute arbitrary code because glot-code-runner supports os.system within a "python" "files" "content" JSON file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/prasmussen/glot-code-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2018-05-19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15747'}, {'type': 'WEB', 'url': 'https://github.com/prasmussen/glot-code-runner/issues/15'}, {'type': 'PACKAGE', 'url': 'https://github.com/prasmussen/glot-code-runner'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T23:40:28Z', 'nvd_published_at': '2019-06-21T14:15:00Z'}
1.4.0
GHSA-5qff-7944-vq4f
2022-12-22T14:02:34Z
2022-05-24T17:12:41Z
null
['CVE-2020-2168']
RCE vulnerability in Jenkins Azure Container Service Plugin
Azure Container Service Plugin 1.0.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to Azure Container Service Plugin’s build step. Azure Container Service ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-acs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2168'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/azure-acs-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1732'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/0...
{'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T14:02:34Z', 'nvd_published_at': '2020-03-25T17:15:00Z'}
1.4.0
GHSA-45fh-g845-pj9w
2023-07-14T21:25:27Z
2022-05-24T16:51:23Z
null
['CVE-2019-13483']
Auth0 Passport-SharePoint does not validate JWT signature
Auth0 Passport-SharePoint before 0.4.0 does not validate the JWT signature of an Access Token before processing. This allows attackers to forge tokens and bypass authentication and authorization mechanisms.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'passport-sharepoint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13483'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2019-13483'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/passport-sharepoint'}]
{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:25:27Z', 'nvd_published_at': '2019-07-25T20:15:00Z'}
1.4.0
GHSA-pg2w-x9wp-vw92
2023-07-31T23:49:22Z
2022-05-13T01:11:23Z
null
['CVE-2015-2296']
Python Requests Session Fixation
The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'last_affected': '2.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2296'}, {'type': 'WEB', 'url': 'https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc'}, {'type': 'WEB', 'url': 'https://warehouse.python.org/project/requests/2.6.0/'}, {'type': 'WEB', 'url': 'http://advisories.ma...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T23:49:22Z', 'nvd_published_at': '2015-03-18T16:59:00Z'}
1.4.0
GHSA-c8mg-wp7h-f2pf
2023-07-24T23:49:05Z
2022-05-14T02:57:59Z
null
['CVE-2018-14835']
Subrion CMS XSS
Subrion CMS v4.2.1 is vulnerable to Stored XSS because of no escaping added to the tooltip information being displayed in multiple areas.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14835'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/760'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/pull/763/commits'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T23:49:05Z', 'nvd_published_at': '2018-08-02T00:29:00Z'}
1.4.0
GHSA-vqf9-v3hc-wr54
2023-07-26T21:09:36Z
2022-05-14T00:55:07Z
null
['CVE-2017-15111']
keycloak-httpd-client-install symlink attack vulnerability
keycloak-httpd-client-install versions before 0.8 insecurely creates temporary file allowing local attackers to overwrite other files via symbolic link.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'keycloak-httpd-client-install'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15111'}, {'type': 'WEB', 'url': 'https://github.com/jdennis/keycloak-httpd-client-install/commit/07f26e213196936fb328ea0c1d5a66a09d8b5440'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2137'}]
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T21:09:36Z', 'nvd_published_at': '2018-01-20T00:29:00Z'}
1.4.0
GHSA-wxvr-vqfp-9cqw
2022-11-01T23:02:42Z
2022-05-14T01:03:28Z
null
['CVE-2016-6346']
Denial of service in JBoss resteasy
RESTEasy enables GZIPInterceptor, which allows remote attackers to cause a denial of service via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.20.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6346'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/resteasy/pull/1303'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1372120'}, {'type': 'PACKAGE', 'url': 'https://github.com/resteasy/Resteasy'}, {'type': 'WEB', 'ur...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:02:42Z', 'nvd_published_at': '2016-09-07T18:59:00Z'}
1.4.0
GHSA-cjw4-2w9r-r8mv
2023-01-23T20:13:13Z
2022-05-24T17:00:40Z
null
['CVE-2019-12410']
Missing Initialization of Resource in Apache Arrow
While investigating UBSAN errors in https://github.com/apache/arrow/pull/5365 it was discovered Apache Arrow versions 0.12.0 to 0.14.1, left memory Array data uninitialized when reading RLE null data from parquet. This affected the C++, Python, Ruby and R implementations. The uninitialized memory could potentially be s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyarrow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.15.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'red-arrow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12410'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cjw4-2w9r-r8mv'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/arrow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyarrow/PYSE...
{'cwe_ids': ['CWE-909'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T14:36:30Z', 'nvd_published_at': '2019-11-08T19:15:00Z'}
1.4.0
GHSA-3pv3-jj4h-p528
2022-06-01T19:42:19Z
2022-05-13T01:15:09Z
null
['CVE-2019-1003040']
Sandbox bypass vulnerability in Jenkins Script Security Plugin
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.55 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003040'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1423'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/script-security-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-03-25/#SECURI...
{'cwe_ids': ['CWE-470'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:42:19Z', 'nvd_published_at': '2019-03-28T18:29:00Z'}