schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-653q-vqm6-gmjm | 2023-09-26T17:20:13Z | 2022-05-24T17:00:23Z | null | ['CVE-2019-8090'] | Magento 2 Community Edition Arbitrary File Deletion | An arbitrary file deletion vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. An authenticated users can manipulate the design layout update feature. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8090'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:14:47Z', 'nvd_published_at': '2019-11-05T22:15:00Z'} |
1.4.0 | GHSA-jxjc-6xmh-h7mg | 2023-08-23T17:58:32Z | 2022-05-24T17:31:03Z | null | ['CVE-2020-24408'] | Magento 2 Community Edition XSS Vulnerability | Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by a persistent XSS vulnerability that allows users to upload malicious JavaScript via the file upload component. This vulnerability could be abused by an unauthenticated attacker to execute XSS attacks against other Magento users. This vulnerability require... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24408'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://helpx.adobe.com/security/products/magento/apsb20-59.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T23:06:59Z', 'nvd_published_at': '2020-10-16T15:15:00Z'} |
1.4.0 | GHSA-q9x6-7hjh-q9fc | 2023-07-20T18:17:58Z | 2022-05-13T01:18:33Z | null | ['CVE-2018-0857'] | ChakraCore RCE Vulnerability | Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0857'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6f4265c3db2aad323bce617324190d021c11126f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0857'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:17:58Z', 'nvd_published_at': '2018-02-15T02:29:00Z'} |
1.4.0 | GHSA-g434-3q2j-hj4r | 2023-07-25T21:28:58Z | 2022-05-14T03:08:36Z | null | ['CVE-2018-12071'] | CodeIgniter Session Fixation Vulnerability | A Session Fixation issue exists in CodeIgniter before 3.1.9 because `session.use_strict_mode` in the Session Library was mishandled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12071'}, {'type': 'WEB', 'url': 'https://github.com/bcit-ci/CodeIgniter/issues/5958'}, {'type': 'WEB', 'url': 'https://github.com/bcit-ci/CodeIgniter/commit/800a20d6c4662d99ae0988b2f8f2238bb8bb29db'}, {'type': 'WEB', 'url': 'https://web.archive.org... | {'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:28:58Z', 'nvd_published_at': '2018-06-17T20:29:00Z'} |
1.4.0 | GHSA-qm7f-r83w-3p46 | 2022-07-01T17:31:59Z | 2022-05-13T01:08:56Z | null | ['CVE-2017-3161'] | Improper Neutralization of Input During Web Page Generation in Apache Hadoop | The HDFS web UI in Apache Hadoop before 2.7.0 is vulnerable to a cross-site scripting (XSS) attack through an unescaped query parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3161'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r127f75748fcabc63bc5a1bec6885753eb9b2bed803b6ed7bd46f965b@%3Cuser.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r66de86b9a608c1da70b2d27d765... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:31:59Z', 'nvd_published_at': '2017-04-26T20:59:00Z'} |
1.4.0 | GHSA-9hvf-pfq3-7pp6 | 2022-12-21T16:37:12Z | 2022-05-24T17:06:22Z | null | ['CVE-2020-2090'] | CSRF vulnerability in Jenkins Amazon EC2 Plugin | Amazon EC2 Plugin 1.47 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to Jenkins to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.
This vulnerability m... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.48'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2090'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1004'}] | {'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T16:37:12Z', 'nvd_published_at': '2020-01-15T16:15:00Z'} |
1.4.0 | GHSA-8h76-7vc3-mj3v | 2023-07-26T23:42:06Z | 2022-05-17T00:32:12Z | null | ['CVE-2017-11792'] | ChakraCore RCE Vulnerability | ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allow an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11793, CVE-2017-11796, CVE-201... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11792'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/3917'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/4e319aa937eeb0c076411ac0fd644225753bcc72'}, {'type': 'WEB', 'url': 'https://portal.msrc... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T23:42:06Z', 'nvd_published_at': '2017-10-13T13:29:00Z'} |
1.4.0 | GHSA-cpcw-p965-wpqx | 2023-08-02T22:38:29Z | 2022-05-24T17:21:16Z | null | ['CVE-2020-14019'] | rtslib-fb weak permissions for /etc/target/saveconfig.json file | Python rtslib-fb through 2.1.72 has weak permissions for `/etc/target/saveconfig.json` because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rtslib-fb'}, 'ecosystem_specific': {'affected_functions': ['rtslib.root.RTSRoot.save_to_file']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.73'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.72'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14019'}, {'type': 'WEB', 'url': 'https://github.com/open-iscsi/rtslib-fb/pull/162'}, {'type': 'WEB', 'url': 'https://github.com/open-iscsi/rtslib-fb/commit/b23d061ee0fa7924d2cdce6194c313b9ee06c468'}, {'type': 'PACKAGE', 'url': 'https://github.com/o... | {'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T22:38:29Z', 'nvd_published_at': '2020-06-19T11:15:00Z'} |
1.4.0 | GHSA-22pv-7v9j-hqxp | 2023-08-17T22:51:04Z | 2022-05-05T00:29:17Z | null | ['CVE-2013-4752'] | Symfony Host Header Injection vulnerability in the HttpFoundation component | Symfony 2.0.X before 2.0.24, 2.1.X before 2.1.12, 2.2.X before 2.2.5, and 2.3.X before 2.3.3 have an issue in the HttpFoundation component. The Host header can be manipulated by an attacker when the framework is generating an absolute URL. A remote attacker could exploit this vulnerability to inject malicious content i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.24'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4752'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4752'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/86365'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerab... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:51:04Z', 'nvd_published_at': '2020-01-02T17:15:00Z'} |
1.4.0 | GHSA-g8pg-qrvm-wgh2 | 2022-06-24T00:58:46Z | 2022-05-24T17:12:40Z | null | ['CVE-2020-2161'] | Improper Neutralization of Input During Web Page Generation in Jenkins | Jenkins 2.227 and earlier, LTS 2.204.5 and earlier does not properly escape node labels that are shown in the form validation for label expressions on job configuration pages, resulting in a stored XSS vulnerability exploitable by users able to define node labels. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.228'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.204.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2161'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1781'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/25/2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:58:46Z', 'nvd_published_at': '2020-03-25T17:15:00Z'} |
1.4.0 | GHSA-6gfm-gpr3-8wh9 | 2023-07-20T18:30:30Z | 2022-05-24T16:52:52Z | null | ['CVE-2018-20962'] | Backpack\CRUD for Laravel XSS Vulnerability | The Backpack\CRUD Backpack component before 3.4.9 for Laravel allows XSS via the select field type. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'backpack/crud'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20962'}, {'type': 'WEB', 'url': 'https://github.com/Laravel-Backpack/CRUD/issues/1297'}, {'type': 'WEB', 'url': 'https://github.com/Laravel-Backpack/CRUD/commit/8b6bd0a2d489a4690f6b1d7ace67e2f07f5f0cc6'}, {'type': 'WEB', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:30:30Z', 'nvd_published_at': '2019-08-08T20:15:00Z'} |
1.4.0 | GHSA-2r2f-g8mw-9gvr | 2022-06-06T18:15:08Z | 2022-05-24T22:14:22Z | null | ['CVE-2022-29208'] | Segfault and OOB write due to incomplete validation in `EditDistance` in TensorFlow | ### Impact
The implementation of [`tf.raw_ops.EditDistance`]() has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service:
```python
import tensorflow as tf
hypothesis_indices = tf.constant(-1250999896764, shape=[3, 3], dtype=tf.int64)
hypothesis_values = tf.const... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2r2f-g8mw-9gvr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29208'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/30721cf564cb029d34535446d6a5a6357bebc8e7'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:14:22Z', 'nvd_published_at': '2022-05-20T23:15:00Z'} |
1.4.0 | GHSA-jwvw-v7c5-m82h | 2022-06-17T21:54:16Z | 2022-05-13T01:06:54Z | null | ['CVE-2015-5237'] | protobuf susceptible to buffer overflow | protobuf allows remote authenticated attackers to cause a heap-based buffer overflow. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Google.Protobuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5237'}, {'type': 'WEB', 'url': 'https://github.com/google/protobuf/issues/760'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1256426'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jwvw-v7c5-m82h'}, {'type... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:54:16Z', 'nvd_published_at': '2017-09-25T17:29:00Z'} |
1.4.0 | GHSA-vhrg-v3cv-p247 | 2022-07-01T17:12:03Z | 2022-05-13T01:02:16Z | null | ['CVE-2017-4995'] | Deserialization of Untrusted Data in Spring Security | An issue was discovered in Pivotal Spring Security 4.2.0.RELEASE through 4.2.2.RELEASE, and Spring Security 5.0.0.M1. When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execution. Jackson fixed this vulnerability by blacklisting known "deseriali... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0.RELEASE'}, {'fixed': '4.2.3.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.2.RELEASE'}}, {'package': {'ecosystem': 'Maven'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-4995'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4641ed8616ccc2c1fbddac2c3dc9900c96387bc226eaf0232d61909b@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T19:40:27Z', 'nvd_published_at': '2017-11-27T10:29:00Z'} |
1.4.0 | GHSA-6xmv-mx7q-789r | 2023-07-21T20:33:12Z | 2022-05-13T01:20:53Z | null | ['CVE-2018-8456'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8354, CVE-2018-8391, CVE-2018-8457, CVE-2018-8459. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8456'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5688'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/98360625854f84262ce8de59a7f57496393281f3'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:33:12Z', 'nvd_published_at': '2018-09-13T00:29:00Z'} |
1.4.0 | GHSA-hmx6-gc2p-5p82 | 2023-07-19T18:05:17Z | 2022-05-13T01:08:15Z | null | ['CVE-2019-5919'] | Nablarch Incomplete Cryptography | An incomplete cryptography of the data store function by using hidden tag in Nablarch 5 (5, and 5u1 to 5u13) allows remote attackers to obtain information of the stored data, to register invalid value, or alter the value via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.nablarch.framework:nablarch-fw-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5919'}, {'type': 'WEB', 'url': 'https://github.com/nablarch/nablarch-fw-web/pull/53'}, {'type': 'WEB', 'url': 'https://github.com/nablarch/nablarch-fw-web/pull/54'}, {'type': 'WEB', 'url': 'https://nablarch.atlassian.net/browse/NAB-313'}, {'type': ... | {'cwe_ids': ['CWE-327'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T18:05:17Z', 'nvd_published_at': '2019-03-12T22:29:00Z'} |
1.4.0 | GHSA-rhvg-r9fw-9wqj | 2023-07-21T19:23:20Z | 2022-05-13T01:20:59Z | null | ['CVE-2018-8557'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8557'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5827'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/e73f2fff33c299934df28f2fc87d41aa9e149c50'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:23:20Z', 'nvd_published_at': '2018-11-14T01:29:00Z'} |
1.4.0 | GHSA-w3p6-94x2-xcvm | 2023-08-04T23:08:41Z | 2022-05-17T04:03:11Z | null | ['CVE-2015-5210'] | Apache Ambari Open Redirect | Open redirect vulnerability in Apache Ambari before 2.1.2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the targetURI parameter. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ambari:ambari'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5210'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/AMBARI/Ambari+Vulnerabilities#AmbariVulnerabilities-FixedinAmbari2.1.2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/10/13/4'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T23:08:41Z', 'nvd_published_at': '2015-11-02T19:59:00Z'} |
1.4.0 | GHSA-m44r-gv6q-9j9r | 2023-01-24T16:02:30Z | 2022-05-24T17:06:56Z | null | ['CVE-2015-2784'] | papercrop does not properly handle crop input | The papercrop gem before 0.3.0 for Ruby on Rails does not properly handle crop input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'papercrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2784'}, {'type': 'WEB', 'url': 'https://github.com/rsantamaria/papercrop/commit/b4ecd95debaf0a8712bd1d34def83f41fc6b3579'}, {'type': 'PACKAGE', 'url': 'https://github.com/rsantamaria/papercrop'}, {'type': 'WEB', 'url': 'https://github.com/rsantamar... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T16:02:30Z', 'nvd_published_at': '2020-01-21T18:15:00Z'} |
1.4.0 | GHSA-2x9h-h3c4-wqqh | 2022-07-06T19:50:21Z | 2022-05-14T01:00:43Z | null | ['CVE-2016-9299'] | Improper Neutralization of Special Elements used in an LDAP Query in Jenkins | The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20'}, {'fixed': '2.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.31'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9299'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!original/jenkinsci-advisories/-fc-w9tNEJE/LZ7EOS0fBgAJ'}, {'type':... | {'cwe_ids': ['CWE-90'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:50:21Z', 'nvd_published_at': '2017-01-12T23:59:00Z'} |
1.4.0 | GHSA-crg2-6xv3-qg5f | 2022-12-22T05:25:16Z | 2022-05-24T17:12:40Z | null | ['CVE-2020-2162'] | Improper Neutralization of Input During Web Page Generation in Jenkins | Jenkins 2.227 and earlier, LTS 2.204.5 and earlier served files uploaded as file parameters to a build without specifying appropriate `Content-Security-Policy HTTP` headers. This resulted in a stored cross-site scripting (XSS) vulnerability exploitable by users with permissions to build a job with file parameters.\n\nJ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.228'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.204.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2162'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1793'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/25/2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:58:29Z', 'nvd_published_at': '2020-03-25T17:15:00Z'} |
1.4.0 | GHSA-46x4-9jmv-jc8p | 2023-09-05T20:12:29Z | 2022-05-17T03:43:00Z | null | ['CVE-2016-2048'] | Django Access Restrictions Bypass | Django 1.9.x before 1.9.2, when `ModelAdmin.save_as` is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the "Save as New" option when editing objects and leveraging the "change" permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9'}, {'fixed': '1.9.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2048'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123075529/http://www.securityfocus.com/bid/82329'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211204051406/http://www.securitytracker.com/id/1034894'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:43:10Z', 'nvd_published_at': '2016-02-08T19:59:00Z'} |
1.4.0 | GHSA-pvhv-qwc8-r2pg | 2023-08-29T21:36:24Z | 2022-05-17T04:32:23Z | null | ['CVE-2012-5501'] | Plone Arbitrary File Read | `at_download.py` in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read arbitrary BLOBs (Files and Images) stored on custom content types via a crafted URL. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5501'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:36:24Z', 'nvd_published_at': '2014-09-30T14:55:00Z'} |
1.4.0 | GHSA-hg5p-233h-c7fh | 2022-07-05T22:05:28Z | 2022-05-01T17:42:17Z | null | ['CVE-2007-0185'] | Direct Web Remoting vulnerable to Denial of Service | Getahead Direct Web Remoting (DWR) before 1.1.4 allows attackers to cause a denial of service (memory exhaustion and servlet outage) via unknown vectors related to a large number of calls in a batch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.directwebremoting:dwr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-0185'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/31382'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:05:28Z', 'nvd_published_at': '2007-01-12T05:04:00Z'} |
1.4.0 | GHSA-5479-gqqr-f9gj | 2023-08-16T23:14:19Z | 2022-05-17T04:18:00Z | null | ['CVE-2014-9509'] | Typo3 Vulnerable to Cache Poisoning | **Problem Description:** A request URL with arbitrary arguments, but still pointing to the home page of a TYPO3 installation can be cached if the configuration option `config.prefixLocalAnchors` is used with the values "all" or "cached". The impact of this vulnerability is that unfamiliar looking links to the home pag... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.39'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9509'}, {'type': 'WEB', 'url': 'http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:14:19Z', 'nvd_published_at': '2015-01-04T21:59:00Z'} |
1.4.0 | GHSA-xhw3-wmx2-76wf | 2022-12-02T21:02:51Z | 2022-05-18T00:00:39Z | null | ['CVE-2022-30950'] | Buffer overflow in Jenkins WMI Windows Agents plugin | WMI Windows Agents Plugin 1.8 and earlier includes the Windows Remote Command library. It provides a general-purpose remote command execution capability that Jenkins uses to check if Java is available, and if not, to install it.
This library has a buffer overflow vulnerability that may allow users able to connect to a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:windows-slaves'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30950'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/windows-slaves-plugin/commit/4638cf0e56caf839eadfdf0fab545abd2a9ac65e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/windows-slaves-plugin'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-120'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T15:50:29Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-294j-r53x-w786 | 2023-07-31T19:13:44Z | 2022-05-14T02:23:11Z | null | ['CVE-2016-3389'] | ChakraCore RCE Vulnerability | The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3386, CVE-2016-7190, and CVE-2016-7194. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3389'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1737'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f05c42e64c3b2d057ae1a52fe1917af26c9f2737'}, {'type': 'WEB', 'url': 'https://docs.microso... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:13:44Z', 'nvd_published_at': '2016-10-14T02:59:00Z'} |
1.4.0 | GHSA-8936-44gw-7664 | 2023-02-08T17:58:53Z | 2022-05-17T03:56:29Z | null | ['CVE-2015-5271'] | TripleO Heat templates might allow remote attackers to obtain sensitive information from private containers | The TripleO Heat templates (tripleo-heat-templates) do not properly order the Identity Service (keystone) before the OpenStack Object Storage (Swift) staticweb middleware in the swiftproxy pipeline when the staticweb middleware is enabled, which might allow remote attackers to obtain sensitive information from private ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tripleo-heat-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5271'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:1862'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2015-5271'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/tripleo/+bug/1494896'}, {'type': '... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:58:53Z', 'nvd_published_at': '2016-04-15T17:59:00Z'} |
1.4.0 | GHSA-545f-pgp7-fwjf | 2022-06-01T21:14:49Z | 2022-05-17T00:00:33Z | null | ['CVE-2021-23266'] | Log value insertion in craftercms | An anonymous user can craft a URL with text that ends up in the log viewer as is. The text can then include textual messages to mislead the administrator. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:craftercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23266'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2022051602'}] | {'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:14:49Z', 'nvd_published_at': '2022-05-16T17:15:00Z'} |
1.4.0 | GHSA-ffr6-8cv5-j637 | 2023-01-06T17:07:28Z | 2022-05-24T17:08:46Z | null | ['CVE-2020-2114'] | Jenkins S3 Publisher Plugin transmits credentials in plain text during configuration | S3 Publisher Plugin stores a secret key in its global configuration. While the credential is stored encrypted on disk, it is transmitted in plain text as part of the configuration form by S3 publisher Plugin 0.11.4 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripti... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.11.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2114'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/s3-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1684'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02/12/3'... | {'cwe_ids': ['CWE-319'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T17:07:28Z', 'nvd_published_at': '2020-02-12T15:15:00Z'} |
1.4.0 | GHSA-r68f-45jg-64m6 | 2023-09-25T18:50:10Z | 2022-05-24T16:52:27Z | null | ['CVE-2019-7927'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to edit product content pages to inject malicious javascript. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7927'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:54:39Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-vf6r-mmhc-3xcm | 2022-06-29T19:11:47Z | 2022-05-13T01:12:21Z | null | ['CVE-2018-14642'] | Exposure of Sensitive Information to an Unauthorized Actor in Undertow | An information leak vulnerability was found in Undertow. If all headers are not written out in the first write() call then the code that handles flushing the buffer will always write out the full contents of the writevBuffer buffer, which may contain data from previous requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.19.FINAL'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.18.FINAL'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14642'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0362'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0364'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0365'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T19:11:47Z', 'nvd_published_at': '2018-09-18T13:29:00Z'} |
1.4.0 | GHSA-pfrc-5hhq-6hvr | 2023-07-24T20:42:30Z | 2022-05-13T01:50:52Z | null | ['CVE-2018-19620'] | Showdoc Unauthenticated Access | ShowDoc 2.4.1 allows remote attackers to edit other users' notes by navigating with a modified `page_id`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19620'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/issues/397'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/bcdb5e3519285bdf81e618b3c9b90d22bc49e13c'}, {'type': 'WEB', 'url': 'https://github.com/CCCCCrash/POC... | {'cwe_ids': ['CWE-425'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T20:42:30Z', 'nvd_published_at': '2018-11-28T08:29:00Z'} |
1.4.0 | GHSA-8q2m-pwxf-jc7g | 2023-08-04T21:53:49Z | 2022-05-17T00:55:33Z | null | ['CVE-2013-2013'] | python-keystoneclient unsecure user password update | The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-keystoneclient'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2013'}, {'type': 'WEB', 'url': 'https://github.com/openstack/python-keystoneclient/commit/f2e0818bc97bfbeba83f6abbb07909a8debcad77'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/python-keystoneclient/+bug/938315'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:53:49Z', 'nvd_published_at': '2013-10-01T20:55:00Z'} |
1.4.0 | GHSA-w3r8-fxv5-58pp | 2023-07-17T20:38:20Z | 2022-05-24T16:52:26Z | null | ['CVE-2019-7892'] | Magento 2 Community Edition RCE Vulnerability via SSRF | A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with administrator privileges to access shipment settings can execute arbitrary code via server-side request forgery. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7892'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:38:20Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-pxgq-gqr9-5gwx | 2022-12-13T15:18:39Z | 2022-05-24T17:39:13Z | null | ['CVE-2021-21605'] | Path traversal vulnerability in Jenkins agent names | Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override unrelated `config.xml` files. If the global `config.xml` file is replaced, Jenkins will start up with unsafe legacy defaults after a restart.
Jenkins 2.275, LTS 2.263.2 e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.263.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.264'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21605'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2021'}] | {'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:51:44Z', 'nvd_published_at': '2021-01-13T16:15:00Z'} |
1.4.0 | GHSA-8c82-9rgp-4qvr | 2022-06-30T19:49:41Z | 2022-05-14T02:45:32Z | null | ['CVE-2017-9802'] | Improper Neutralization of Input During Web Page Generation Apache Sling Servlets Post | The Javascript method Sling.evalString() in Apache Sling Servlets Post before 2.3.22 uses the javascript 'eval' function to parse input strings, which allows for XSS attacks by passing specially crafted input strings. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.servlets.post'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9802'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-7041'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2f4b8333e44c6e7e0b00933bd4204ce64829952f60dbb6814f2cdf91@%3Cdev.sling.apache.org%3E'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T19:49:41Z', 'nvd_published_at': '2017-08-14T13:29:00Z'} |
1.4.0 | GHSA-pcf7-5974-vjh4 | 2023-07-25T19:21:06Z | 2022-05-14T02:20:16Z | null | ['CVE-2018-15601'] | Elefant CMS Improper Input Validation | `apps/filemanager/handlers/upload/drop.php` in Elefant CMS 2.0.3 performs a urldecode step too late in the "Cannot upload executable files" protection mechanism. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15601'}, {'type': 'WEB', 'url': 'https://github.com/jbroadway/elefant/commit/afb3346e50b992bcba143660ca2149e563430e05'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:21:06Z', 'nvd_published_at': '2018-08-21T02:29:00Z'} |
1.4.0 | GHSA-8x8p-mfwv-9fjw | 2023-02-08T18:01:50Z | 2022-05-17T03:53:31Z | null | ['CVE-2014-3680'] | Jenkins Exposure of Sensitive Information to an Unauthorized Actor vulnerability | Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Job/READ permission to obtain the default value for the password field of a parameterized job by reading the DOM. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.566'}, {'fixed': '1.583'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3680'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0070'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-3680'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1148645'}, {'type... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:01:50Z', 'nvd_published_at': '2014-10-16T19:55:00Z'} |
1.4.0 | GHSA-5xm9-rf63-wj7h | 2022-07-13T17:56:38Z | 2022-05-17T05:18:15Z | null | ['CVE-2011-2732'] | Improper Control of Generation of Code in Spring Security | CRLF injection vulnerability in the logout functionality in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the spring-security-redirect parameter. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'ev... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2732'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security'}, {'type': 'WEB', 'url': 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814'}, {'type': 'WEB', 'url': 'http://support.springsource.com/security/cve-2011-2... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:56:38Z', 'nvd_published_at': '2012-12-05T17:55:00Z'} |
1.4.0 | GHSA-hrf4-ww4w-6rv6 | 2023-07-27T19:24:02Z | 2022-05-17T00:32:27Z | null | ['CVE-2017-11797'] | ChakraCore RCE Vulnerability | ChakraCore allows an attacker to execute arbitrary code in the context of the current user, due to how the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11798, CVE-20... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11797'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/3917'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/9a3ad7ccba1fae1549e21369982d59d45a2ab6cf'}, {'type': 'WEB', 'url': 'https://portal.msrc... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:24:02Z', 'nvd_published_at': '2017-10-13T13:29:00Z'} |
1.4.0 | GHSA-c4r2-3f9r-rwp8 | 2023-09-26T18:05:26Z | 2022-05-24T17:00:24Z | null | ['CVE-2019-8113'] | Magento 2 Community Weak PRNG | Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1 uses cryptographically weak random number generator to brute-force the confirmation code for customer registration. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8113'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:05:29Z', 'nvd_published_at': '2019-11-05T23:15:00Z'} |
1.4.0 | GHSA-px42-mr8m-cpgh | 2023-08-07T20:27:41Z | 2022-05-17T19:57:06Z | null | ['CVE-2014-3656'] | JBoss KeyCloak Cross-site Scripting Vulnerability | If a JBoss Keycloak application was configured to use `*` as a permitted web origin in the Keycloak administrative console, crafted requests to the `login-status-iframe.html` endpoint could inject arbitrary Javascript into the generated HTML code via the "origin" query parameter, leading to a cross-site scripting (XSS)... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0.Beta1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3656'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/63b41e2548cbc20bd3758e34a82d880e177bf24c'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2014-3656'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T20:27:41Z', 'nvd_published_at': '2019-12-10T14:15:00Z'} |
1.4.0 | GHSA-23fm-v895-3qxq | 2023-07-13T19:03:27Z | 2022-05-24T17:22:31Z | null | ['CVE-2020-15514'] | jh_captcha for Typo3 XSS Vulnerability | The jh_captcha extension through 2.1.3, and 3.x through 3.0.2, for TYPO3 allows XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'haffner/jh_captcha'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.2'}}, {'package': {'ecosystem': 'Packagist', 'name': 'haffner/jh_captcha'}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15514'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-012'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T19:03:27Z', 'nvd_published_at': '2020-07-07T14:15:00Z'} |
1.4.0 | GHSA-2g56-7jv7-wxxq | 2022-07-08T19:39:44Z | 2022-05-14T01:37:06Z | null | ['CVE-2013-5960'] | Missing Cryptographic Step in OWASP Enterprise Security API for Java | The authenticated-encryption feature in the symmetric-encryption implementation in the OWASP Enterprise Security API (ESAPI) for Java 2.x before 2.1.0.1 does not properly resist tampering with serialized ciphertext, which makes it easier for remote attackers to bypass intended cryptographic protection mechanisms via an... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.esapi:esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0.0'}, {'fixed': '2.1.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5960'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/issues/359'}, {'type': 'WEB', 'url': 'https://github.com/esapi/esapi-java-legacy/issues/306'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/blob/master... | {'cwe_ids': ['CWE-325'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:39:44Z', 'nvd_published_at': '2013-09-30T17:09:00Z'} |
1.4.0 | GHSA-qpr7-5m63-hq2c | 2022-07-07T23:25:29Z | 2022-05-14T02:54:05Z | null | ['CVE-2013-6235'] | Improper Neutralization of Input During Web Page Generation in JAMon | Multiple cross-site scripting (XSS) vulnerabilities in JAMon (Java Application Monitor) 2.7 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) listenertype or (2) currentlistener parameter to mondetail.jsp or ArraySQL parameter to (3) mondetail.jsp, (4) jamonadmin.jsp, (5) sql.jsp, or... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.jamonapi:jamon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.80'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6235'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/90699'}, {'type': 'WEB', 'url': 'http://osvdb.org/102570'}, {'type': 'WEB', 'url': 'http://osvdb.org/102571'}, {'type': 'WEB', 'url': 'http://osvdb.org/102572'}, {... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:25:29Z', 'nvd_published_at': '2014-01-31T15:07:00Z'} |
1.4.0 | GHSA-h798-h7ff-93xv | 2023-08-01T20:29:54Z | 2022-05-13T01:12:46Z | null | ['CVE-2015-3175'] | Moodle Arbitrary Redirect | Multiple open redirect vulnerabilities in Moodle through 2.5.9, 2.6.x before 2.6.11, 2.7.x before 2.7.8, and 2.8.x before 2.8.6 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving an error page that links to a URL from an HTTP Referer header. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6'}, {'fixed': '2.6.11'}]}]}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3175'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/b2687a055dc990ca86ddce178d5aee3fb1df644a'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/dd0607b7bbaff38cc62e4d00658c02da3fdbb4c8'}, {'type': 'WEB', 'url': '... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T20:29:54Z', 'nvd_published_at': '2015-06-01T19:59:00Z'} |
1.4.0 | GHSA-xfrw-pcmc-r2p3 | 2022-12-15T17:25:38Z | 2022-05-24T17:45:46Z | null | ['CVE-2021-21632'] | Missing permission checks in Jenkins OWASP Dependency-Track Plugin allow capturing credentials | OWASP Dependency-Track Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing \"Secret text\" credentials stored... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dependency-track'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21632'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dependency-track-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2250'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:25:38Z', 'nvd_published_at': '2021-03-30T12:16:00Z'} |
1.4.0 | GHSA-5wc4-w63v-97c3 | 2022-12-15T16:48:02Z | 2022-05-24T19:12:36Z | null | ['CVE-2021-21680'] | XXE vulnerability in Jenkins Nested View Plugin | Nested View Plugin 1.20 and earlier does not configure its XML transformer to prevent XML external entity (XXE) attacks.
This allows attackers able to configure views to have Jenkins parse a crafted view XML definition that uses external entities for extraction of secrets from the Jenkins controller or server-side req... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nested-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.20'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21680'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/nested-view-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-08-31/#SECURITY-2411'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T16:48:02Z', 'nvd_published_at': '2021-08-31T14:15:00Z'} |
1.4.0 | GHSA-f25h-3mj6-4jpg | 2023-01-23T14:44:47Z | 2022-05-17T04:55:27Z | null | ['CVE-2013-7249'] | Fat Free CRM vulnerable to Exposure of Sensitive Information | Fat Free CRM before 0.12.1 does not restrict XML serialization, which allows remote attackers to obtain sensitive information via a direct request, as demonstrated by a request for `users/1.xml`, a different vulnerability than CVE-2013-7224. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7249'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/issues/300'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/cf26a04b356ad2161c4c6160260eb870a3de5328'}, {'type': 'PACKAGE', 'url': 'https://githu... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T14:44:47Z', 'nvd_published_at': '2014-01-02T14:59:00Z'} |
1.4.0 | GHSA-2xjx-v99w-gqf3 | 2022-07-08T19:27:45Z | 2022-05-14T01:41:10Z | null | ['CVE-2019-0545'] | Exposure of Sensitive Information in System.Net.Http | An information disclosure vulnerability exists in .NET Framework and .NET Core which allows bypassing Cross-origin Resource Sharing (CORS) configurations, aka ".NET Framework Information Disclosure Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.6.2/4.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.7'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0545'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/94'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0040'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/adviso... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:27:45Z', 'nvd_published_at': '2019-01-08T21:29:00Z'} |
1.4.0 | GHSA-f9v6-p7hp-c3qx | 2023-01-14T05:22:07Z | 2022-05-24T17:10:28Z | null | ['CVE-2020-2142'] | Missing permission checks in Jenkins P4 Plugin | A missing permission check in Jenkins P4 Plugin 1.10.10 and earlier allows attackers with Overall/Read permission to trigger builds or add labels in the Perforce repository.
P4 Plugin 1.10.11 appropriate user permissions for the affected HTTP endpoints. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:p4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2142'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/p4-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1765'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/09/1'... | {'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:22:07Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
1.4.0 | GHSA-6cr4-7c7p-p3xv | 2022-07-13T18:30:02Z | 2022-05-14T01:17:03Z | null | ['CVE-2011-5064'] | Use of Hard-coded Cryptographic Key in Apache Tomcat | DigestAuthenticator.java in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server secret (aka private key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by lev... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-5064'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:30:02Z', 'nvd_published_at': '2012-01-14T21:55:00Z'} |
1.4.0 | GHSA-8rjr-6qq5-pj9p | 2023-07-28T20:46:52Z | 2022-05-14T00:59:49Z | null | ['CVE-2016-1494'] | Python RSA allows attackers to spoof signatures | The verify function in the RSA package for Python (Python-RSA) before 3.3 allows attackers to spoof signatures with a small public exponent via crafted signature padding, aka a BERserk attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rsa'}, 'ecosystem_specific': {'affected_functions': ['verify', 'rsa.pkcs1.verify(message, signature, pub_key):', 'rsa.pkcs1._find_method_hash']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1494'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/commit/ab5d21c3b554f926d51ff3ad9c794bcf32e95b3c'}, {'type': 'WEB', 'url': 'https://bitbucket.org/sybren/python-rsa/pull-requests/14/security-fix-bb06-attack-in-verify-by/dif... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:46:52Z', 'nvd_published_at': '2016-01-13T15:59:00Z'} |
1.4.0 | GHSA-9m72-pw47-292w | 2023-07-21T18:11:26Z | 2022-05-13T01:19:30Z | null | ['CVE-2018-17856'] | Joomla RCE Vulnerability | An issue was discovered in Joomla! before 3.8.13. com_joomlaupdate allows the execution of arbitrary code. The default ACL config enabled the ability of Administrator-level users to access com_joomlaupdate and trigger code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'joomla/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.4'}, {'fixed': '3.8.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.12'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17856'}, {'type': 'WEB', 'url': 'https://developer.joomla.org/security-centre/752-20181002-core-inadequate-default-access-level-for-com-joomlaupdate.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/joomla/joomla-cms'}, {'type': 'WEB', 'url': ... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T18:11:26Z', 'nvd_published_at': '2018-10-09T21:29:00Z'} |
1.4.0 | GHSA-4wrr-9h5r-m92w | 2023-08-29T20:37:05Z | 2022-05-04T00:29:43Z | null | ['CVE-2012-0391'] | Apache Struts Remote Java Code Execution | The `ExceptionDelegator` component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0391'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/commit/25e50069d60434a30395e3a98357ffba2bed427e'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/WW-3668'}, {'type': 'WEB', 'url': 'https://www.sec-consult.com/files/2... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T20:37:05Z', 'nvd_published_at': '2012-01-08T15:55:00Z'} |
1.4.0 | GHSA-v2fp-h4qx-x3r6 | 2022-11-01T22:26:52Z | 2022-05-17T05:18:47Z | null | ['CVE-2012-1154'] | Improper Access Control in JBoss mod_cluster | mod_cluster 1.0.10 before 1.0.10 CP03 and 1.1.x before 1.1.4, as used in JBoss Enterprise Application Platform 5.1.2, when "ROOT" is set to excludedContexts, exposes the root context of the server, which allows remote attackers to bypass access restrictions and gain access to applications deployed on the root context v... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.mod_cluster:mod_cluster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1154'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=802200'}, {'type': 'WEB', 'url': 'https://community.jboss.org/message/624018'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/MODCLUSTER-253'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:26:52Z', 'nvd_published_at': '2012-10-22T23:55:00Z'} |
1.4.0 | GHSA-4qf5-7xc2-wqpg | 2023-07-13T17:06:07Z | 2022-05-24T17:09:34Z | null | ['CVE-2020-5187'] | DNN Path Traversal via Zip Slip | DNN (formerly DotNetNuke) through 9.4.4 allows Path Traversal via unsafe handling of zip files | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5187'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/releases'}, {'type': 'WEB', 'url': 'https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-secure-as-you-think-e8516f789175'}, {'type': 'WEB', 'url': 'http://packetsto... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:06:07Z', 'nvd_published_at': '2020-02-24T15:15:00Z'} |
1.4.0 | GHSA-9xfc-j5mf-9w5p | 2022-06-20T22:24:50Z | 2022-05-17T02:49:31Z | null | ['CVE-2016-6348'] | JacksonJsonpInterceptor susceptible to cross-site script inclusion (XSSI) attack | JacksonJsonpInterceptor in RESTEasy might allow remote attackers to conduct a cross-site script inclusion (XSSI) attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.20.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6348'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1372129'}, {'type': 'PACKAGE', 'url': 'https://github.com/resteasy/Resteasy'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:24:50Z', 'nvd_published_at': '2017-04-12T22:59:00Z'} |
1.4.0 | GHSA-2j5w-cwc3-8hxw | 2022-11-01T22:49:48Z | 2022-05-24T17:03:47Z | null | ['CVE-2019-16558'] | Improper Certificate Validation in Jenkins Spira Importer Plugin | Jenkins Spira Importer Plugin 3.2.3 and earlier disables SSL/TLS certificate validation for the Jenkins master JVM. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.inflectra.spiratest.plugins:inflectra-spira-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16558'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1580'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:49:48Z', 'nvd_published_at': '2019-12-17T15:15:00Z'} |
1.4.0 | GHSA-j7j6-7hfx-5522 | 2022-06-27T16:10:41Z | 2022-05-24T17:07:06Z | null | ['CVE-2019-16792'] | Inconsistent Interpretation of HTTP Requests in Waitress | Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16792'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T16:10:41Z', 'nvd_published_at': '2020-01-22T19:15:00Z'} |
1.4.0 | GHSA-vqp8-h53h-3jfh | 2022-12-29T00:27:18Z | 2022-05-24T17:22:18Z | null | ['CVE-2020-2205'] | Stored XSS vulnerability in Jenkins VncRecorder Plugin | VncRecorder Plugin 1.25 and earlier does not escape a tool path in the `checkVncServ` form validation endpoint accessed e.g. via job configuration forms.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by Jenkins administrators.
VncRecorder Plugin 1.35 escapes the tool path. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vncrecorder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.35'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.25'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2205'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vncrecorder-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1728%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securit... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T00:27:18Z', 'nvd_published_at': '2020-07-02T15:15:00Z'} |
1.4.0 | GHSA-6r5v-hp32-fjqw | 2022-07-06T20:29:35Z | 2022-05-14T02:57:28Z | null | ['CVE-2015-0227'] | Improper Access Control in Apache WSS4J | Apache WSS4J before 1.6.17 and 2.x before 2.0.2 allows remote attackers to bypass the requireSignedEncryptedDataElements configuration via a vectors related to "wrapping attacks." | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ws.security:wss4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.ws.security:wss4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0227'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/100837'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03900en_us'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:29:35Z', 'nvd_published_at': '2015-02-12T16:59:00Z'} |
1.4.0 | GHSA-98vc-98q7-57qf | 2023-07-31T22:07:51Z | 2022-05-17T02:45:41Z | null | ['CVE-2017-7888'] | Dolibarr ERP and CRM Insecure Encryption | Dolibarr ERP/CRM 4.0.4 stores passwords with the MD5 algorithm, which makes brute-force attacks easier. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7888'}, {'type': 'WEB', 'url': 'https://www.foxmole.com/advisories/foxmole-2017-02-23.txt'}] | {'cwe_ids': ['CWE-326'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:07:51Z', 'nvd_published_at': '2017-05-10T14:29:00Z'} |
1.4.0 | GHSA-9m48-54pj-h248 | 2022-06-28T22:30:13Z | 2022-05-24T16:55:01Z | null | ['CVE-2019-10383'] | Improper Neutralization of Input During Web Page Generation in Jenkins | A stored cross-site scripting vulnerability in Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed attackers with Overall/Administer permission to configure the update site URL to inject arbitrary HTML and JavaScript in update center web pages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.176.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.176.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10383'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2789'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3144'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1453'},... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:30:13Z', 'nvd_published_at': '2019-08-28T16:15:00Z'} |
1.4.0 | GHSA-rj8f-g5gm-jw5c | 2023-08-01T22:57:24Z | 2022-05-24T16:52:25Z | null | ['CVE-2019-7887'] | Magento 2 Community Edition Cross-site Scripting Vulnerability | A reflected cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 when the feature that adds a secret key to the Admin URL is disabled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7887'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:57:24Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-gghc-g8cj-4vfv | 2022-12-15T17:36:30Z | 2022-05-24T19:16:59Z | null | ['CVE-2021-21684'] | Stored XSS vulnerability in Jenkins Git Plugin | Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted commit notifications to the `/git/notifyCommit` endpoi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.8.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21684'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2499'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10... | {'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:36:30Z', 'nvd_published_at': '2021-10-06T23:15:00Z'} |
1.4.0 | GHSA-vwqh-cmvp-6694 | 2023-07-21T20:19:14Z | 2022-05-13T01:20:45Z | null | ['CVE-2018-8286'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8280, CVE-2018-8290, CVE-2018-8294. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8286'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5444'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/0ac4253cbc2d7f63e638a4930b552814bd64aa5d'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:19:14Z', 'nvd_published_at': '2018-07-11T00:29:00Z'} |
1.4.0 | GHSA-mr5m-2385-2vcp | 2023-07-17T18:29:36Z | 2022-05-24T17:13:39Z | null | ['CVE-2020-11610'] | xdlocalstorage does not verify request origin | An issue was discovered in xdLocalStorage through 2.0.5. The `postData()` function in `xdLocalStoragePostMessageApi.js` specifies the wildcard (`*`) as the targetOrigin when calling the `postMessage()` function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'xdlocalstorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11610'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19'}, {'type': 'PACKAGE', 'url': 'https://github.com/ofirdaga... | {'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T18:29:36Z', 'nvd_published_at': '2020-04-07T18:15:00Z'} |
1.4.0 | GHSA-m5pm-rgvf-vg22 | 2022-11-22T18:56:58Z | 2022-05-17T02:28:11Z | null | ['CVE-2017-7666'] | Apache OpenMeetings vulnerable to Cross-Site Request Forgery | Apache OpenMeetings 1.0.0 is vulnerable to Cross-Site Request Forgery (CSRF) attacks, XSS attacks, click-jacking, and MIME based attacks. The issue is fixed in version 3.3.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7666'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/fkesu4e5hhz5xdbg'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:56:58Z', 'nvd_published_at': '2017-07-17T13:18:00Z'} |
1.4.0 | GHSA-4gqp-296r-j5mq | 2023-02-08T17:58:05Z | 2022-05-14T01:53:10Z | null | ['CVE-2016-5003'] | Apache XML-RPC vulnerable to Deserialization of Untrusted Data | The Apache XML-RPC (aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote attackers to execute arbitrary code via a crafted serialized Java object in an <ex:serializable> element. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlrpc:xmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5003'}, {'type': 'WEB', 'url': 'https://0ang3el.blogspot.ru/2016/07/beware-of-ws-xmlrpc-library-in-your.html'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1779'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:58:05Z', 'nvd_published_at': '2017-10-27T18:29:00Z'} |
1.4.0 | GHSA-mj48-f959-pqph | 2023-08-29T18:14:44Z | 2022-05-17T04:49:44Z | null | ['CVE-2013-7335'] | DotNetNuke (DNN) Open redirect vulnerability | Open redirect vulnerability in DotNetNuke (DNN) before 6.2.9 and 7.x before 7.1.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7335'}, {'type': 'PACKAGE', 'url': 'https://github.com/dnnsoftware/Dnn.Platform'}, {'type': 'WEB', 'url': 'http://www.dnnsoftware.com/platform/manage/security-center'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/61809'}] | {'cwe_ids': ['CWE-20', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:14:44Z', 'nvd_published_at': '2014-03-12T14:55:00Z'} |
1.4.0 | GHSA-5whw-5cmm-9jw4 | 2023-08-29T21:36:49Z | 2022-05-17T04:32:23Z | null | ['CVE-2012-5504'] | Plone Cross-site scripting Vulnerability | Cross-site scripting (XSS) vulnerability in widget_traversal.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5504'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:36:49Z', 'nvd_published_at': '2014-09-30T14:55:00Z'} |
1.4.0 | GHSA-q6w2-jxcm-2crj | 2022-06-09T23:51:03Z | 2022-05-17T05:47:38Z | null | ['CVE-2008-7263'] | Improper Authentication in pyftpdlib | ftpserver.py in pyftpdlib before 0.5.0 does not delay its response after receiving an invalid login attempt, which makes it easier for remote attackers to obtain access via a brute-force attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-7263'}, {'type': 'WEB', 'url': 'https://github.com/giampaolo/pyftpdlib/issues/73'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q6w2-jxcm-2crj'}, {'type': 'PACKAGE', 'url': 'https://github.com/giampaolo/pyftpdlib'}, {'type': 'WE... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:51:03Z', 'nvd_published_at': '2010-10-19T20:00:00Z'} |
1.4.0 | GHSA-j984-q4qc-6qxf | 2023-08-04T23:10:05Z | 2022-05-17T03:50:02Z | null | ['CVE-2015-7558'] | librsvg DoS via Cyclic References | librsvg before 2.40.12 allows context-dependent attackers to cause a denial of service (infinite loop, stack consumption, and application crash) via cyclic references in an SVG document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'librsvg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.40.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7558'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1268243'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/librsvg/commit/?id=a51919f7e1ca9c535390a746fbf6e28c8402dc61'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T23:10:05Z', 'nvd_published_at': '2016-05-20T14:59:00Z'} |
1.4.0 | GHSA-264w-xrr7-6qqg | 2022-12-28T23:19:17Z | 2022-05-24T17:12:40Z | null | ['CVE-2020-2167'] | RCE vulnerability in Jenkins OpenShift Pipeline Plugin | OpenShift Pipeline Plugin 1.0.56 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to OpenShift Pipeline Plugin’s build step. OpenShift Pipeline Plugin 1.0.57 c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.openshift.jenkins:openshift-pipeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.57'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.56'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2167'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/openshift-pipeline-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1739'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T23:19:17Z', 'nvd_published_at': '2020-03-25T17:15:00Z'} |
1.4.0 | GHSA-43qp-hphf-5rjw | 2023-07-27T19:39:18Z | 2022-05-17T00:19:54Z | null | ['CVE-2017-11871'] | Chakra Core Privilege Escalation | ChakraCore and Microsoft Edge in Windows 10 1703, 1709, and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11871'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4226'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/9d211a417757ba1ddcd0f2e72d9553535256107e'}, {'type': 'WEB', 'url': 'https://portal.msrc... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:39:18Z', 'nvd_published_at': '2017-11-15T03:29:00Z'} |
1.4.0 | GHSA-6mpp-cm3v-23vv | 2022-12-14T16:21:33Z | 2022-05-24T19:04:53Z | null | ['CVE-2021-21663'] | Missing permission check in Jenkins XebiaLabs XL Deploy Plugin allows capturing credentials | A missing permission check in Jenkins XebiaLabs XL Deploy Plugin 7.5.8 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing Username/password credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xebialabs.deployit.ci:deployit-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21663'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xldeploy-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-1982'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T16:21:33Z', 'nvd_published_at': '2021-06-10T15:15:00Z'} |
1.4.0 | GHSA-79rm-f26g-296p | 2023-03-03T22:59:11Z | 2022-05-24T16:51:51Z | null | ['CVE-2019-10360'] | Jenkins Maven Release Plugin vulnerable to Cross-site Scripting | Maven Release Plug-in Plugin did not properly escape variables in multiple views, resulting in a stored cross-site scripting vulnerability.
Variables on affected views are now escaped. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.m2release:m2release'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10360'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/07/31/1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:59:11Z', 'nvd_published_at': '2019-07-31T13:15:00Z'} |
1.4.0 | GHSA-cx5r-p4vj-2mqh | 2023-03-03T23:14:54Z | 2022-05-24T16:52:46Z | null | ['CVE-2019-10373'] | Jenkins Build Pipeline Plugin vulnerable to Cross-site Scripting | Build Pipeline Plugin does not properly escape variables in views, resulting in a stored cross-site scripting vulnerability exploitable by users with permission to configure build pipelines.
This vulnerability is only exploitable on Jenkins releases older than 2.146 or 2.138.2 due to the security hardening implemented... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-pipeline-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10373'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-07/#SECURITY-879'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/08/07/1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:14:54Z', 'nvd_published_at': '2019-08-07T15:15:00Z'} |
1.4.0 | GHSA-pf27-929j-9pmm | 2022-06-24T01:23:52Z | 2022-05-24T17:27:38Z | null | ['CVE-2020-1912'] | Out-of-bounds Read and Out-of-bounds Write in Facebook Hermes | An out-of-bounds read/write vulnerability when executing lazily compiled inner generator functions in Facebook Hermes prior to commit 091835377369c8fd5917d9b87acffa721ad2a168 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hermes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1912'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/commit/091835377369c8fd5917d9b87acffa721ad2a168'}, {'type': 'WEB', 'url': 'https://www.facebook.com/security/advisories/cve-2020-1912'}] | {'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:23:52Z', 'nvd_published_at': '2020-09-09T19:15:00Z'} |
1.4.0 | GHSA-q7jx-r75r-hgj2 | 2022-12-12T21:30:54Z | 2022-05-14T03:23:50Z | null | ['CVE-2018-1000144'] | Jenkins Cucumber Living Documentation Plugin Cross-site Scripting vulnerability | A cross site scripting vulnerability exists in Jenkins Cucumber Living Documentation Plugin 1.0.12 and older in CukedoctorBaseAction#doDynamic that disables the Content-Security-Policy protection for archived artifacts and workspace files, allowing attackers able to control the content of these files to attack Jenkins ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cucumber-living-documentation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.12'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000144'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cucumber-living-documentation-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-308'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:30:54Z', 'nvd_published_at': '2018-04-05T13:29:00Z'} |
1.4.0 | GHSA-79hg-357g-rrgv | 2023-07-22T00:08:05Z | 2022-05-14T00:55:28Z | null | ['CVE-2018-19271'] | Centreon SQL Injection | Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.28) allows SQL Injection via the main.php searchH parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '18.10.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19271'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6625'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-22T00:08:05Z', 'nvd_published_at': '2018-11-14T11:29:00Z'} |
1.4.0 | GHSA-c2hg-2jj6-h8vh | 2022-12-20T21:29:22Z | 2022-05-24T17:25:25Z | null | ['CVE-2020-2235'] | CSRF vulnerability in Jenkins Pipeline Maven Integration Plugin allow capturing credentials | Pipeline Maven Integration Plugin 3.8.2 and earlier does not perform a permission check in a method implementing form validation.
This allows users with Overall/Read access to Jenkins to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capt... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-maven'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2235'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-maven-plugin/'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1794%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T21:29:22Z', 'nvd_published_at': '2020-08-12T14:15:00Z'} |
1.4.0 | GHSA-4793-8wwh-jxxr | 2022-06-06T21:19:22Z | 2022-05-25T00:00:37Z | null | ['CVE-2022-1848'] | Business Logic Errors in Para | Paraara prior to version 1.46.0 is vulnerable to business logic errors. A user can create more than one app, even after they reach the app limit. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.erudika:para-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.46.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1848'}, {'type': 'WEB', 'url': 'https://github.com/erudika/para/commit/fa677c629842df60099daa9c23bd802bc41b48d1'}, {'type': 'PACKAGE', 'url': 'https://github.com/erudika/para'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8dfe0877-e44b-4a1a-... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:19:22Z', 'nvd_published_at': '2022-05-24T13:15:00Z'} |
1.4.0 | GHSA-qhxf-m7jm-jc57 | 2023-01-14T05:26:30Z | 2022-05-24T17:08:46Z | null | ['CVE-2020-2116'] | CSRF vulnerability in Pipeline GitHub Notify Step Plugin allows capturing credentials | A cross-site request forgery vulnerability in Jenkins Pipeline GitHub Notify Step Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-githubnotify-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2116'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-githubnotify-step-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-812%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lis... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:26:30Z', 'nvd_published_at': '2020-02-12T15:15:00Z'} |
1.4.0 | GHSA-7xfj-4jpg-58vf | 2023-07-25T17:52:15Z | 2022-05-14T01:53:42Z | null | ['CVE-2018-18530'] | ThinkPHP SQLi Vulnerability | ThinkPHP 5.1.25 has SQL Injection via the count parameter because the library/think/db/Query.php aggregate function mishandles the aggregate variable. NOTE: a backquote character is required in the attack URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.25'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18530'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2613'}, {'type': 'WEB', 'url': 'https://www.kingkk.com/2018/10/Thinkphp-%E8%81%9A%E5%90%88%E6%9F%A5%E8%AF%A2%E6%BC%8F%E6%B4%9E/#ThinkPHP5-lt-5-1-25'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T17:52:15Z', 'nvd_published_at': '2018-10-19T20:29:00Z'} |
1.4.0 | GHSA-w5q4-q7wp-qww6 | 2023-07-31T19:59:16Z | 2022-05-24T16:48:16Z | null | ['CVE-2019-12823'] | Craft CMS XSS Vulnerability | Craft CMS before 3.1.31 does not properly filter XML feeds, thus allowing XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12823'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/6432eca59b93bcea2ca2616199e5d419447e613f'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/6432eca5... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:59:16Z', 'nvd_published_at': '2019-06-18T13:15:00Z'} |
1.4.0 | GHSA-5whg-j5fv-xcm2 | 2023-07-28T20:27:48Z | 2022-05-14T02:22:42Z | null | ['CVE-2016-7200'] | ChakraCore RCE Vulnerability | The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7201, CVE-2016-7202, CVE-2016-7203, CVE-2016... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7200'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1982'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c2787ef8fdb7401922e9ec6540e4e5895d11c631'}, {'type': 'WEB', 'url': 'https://docs.microso... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:27:48Z', 'nvd_published_at': '2016-11-10T06:59:00Z'} |
1.4.0 | GHSA-236h-r3w7-c85c | 2022-11-04T18:41:07Z | 2022-05-13T01:30:22Z | null | ['CVE-2017-3151'] | Cross-site Scripting in Apache Atlas | Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Stored Cross-Site Scripting in the edit-tag functionality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:atlas-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1-incubating'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3151'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/atlas'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4a4fef91e067fd0d9da569e30867c1fa65e2a0520acde71ddefee0ea@%3Cdev.atlas.apache.org%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:41:07Z', 'nvd_published_at': '2017-08-29T20:29:00Z'} |
1.4.0 | GHSA-x55p-6526-xmmp | 2022-07-01T17:49:58Z | 2022-05-13T01:36:54Z | null | ['CVE-2017-2603'] | Exposure of Sensitive Information to an Unauthorized Actor in Jenkins | Jenkins before versions 2.44 and 2.32.2 is vulnerable to a user data leak in disconnected agents' config.xml API. This could leak sensitive data such as API tokens (SECURITY-362). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.32.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2603'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/3cd946cbef82c6da5ccccf3890d0ae4e091c4265'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2603'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:49:58Z', 'nvd_published_at': '2018-05-15T21:29:00Z'} |
1.4.0 | GHSA-vj95-2f9q-x7h6 | 2023-07-19T23:40:28Z | 2022-05-24T16:48:34Z | null | ['CVE-2018-15747'] | glot-code-runner RCE | The default configuration of glot-www through 2018-05-19 allows remote attackers to execute arbitrary code because glot-code-runner supports os.system within a "python" "files" "content" JSON file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/prasmussen/glot-code-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2018-05-19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15747'}, {'type': 'WEB', 'url': 'https://github.com/prasmussen/glot-code-runner/issues/15'}, {'type': 'PACKAGE', 'url': 'https://github.com/prasmussen/glot-code-runner'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T23:40:28Z', 'nvd_published_at': '2019-06-21T14:15:00Z'} |
1.4.0 | GHSA-5qff-7944-vq4f | 2022-12-22T14:02:34Z | 2022-05-24T17:12:41Z | null | ['CVE-2020-2168'] | RCE vulnerability in Jenkins Azure Container Service Plugin | Azure Container Service Plugin 1.0.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to Azure Container Service Plugin’s build step.
Azure Container Service ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-acs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2168'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/azure-acs-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1732'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/0... | {'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T14:02:34Z', 'nvd_published_at': '2020-03-25T17:15:00Z'} |
1.4.0 | GHSA-45fh-g845-pj9w | 2023-07-14T21:25:27Z | 2022-05-24T16:51:23Z | null | ['CVE-2019-13483'] | Auth0 Passport-SharePoint does not validate JWT signature | Auth0 Passport-SharePoint before 0.4.0 does not validate the JWT signature of an Access Token before processing. This allows attackers to forge tokens and bypass authentication and authorization mechanisms. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'passport-sharepoint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13483'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2019-13483'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/passport-sharepoint'}] | {'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:25:27Z', 'nvd_published_at': '2019-07-25T20:15:00Z'} |
1.4.0 | GHSA-pg2w-x9wp-vw92 | 2023-07-31T23:49:22Z | 2022-05-13T01:11:23Z | null | ['CVE-2015-2296'] | Python Requests Session Fixation | The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'last_affected': '2.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2296'}, {'type': 'WEB', 'url': 'https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc'}, {'type': 'WEB', 'url': 'https://warehouse.python.org/project/requests/2.6.0/'}, {'type': 'WEB', 'url': 'http://advisories.ma... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T23:49:22Z', 'nvd_published_at': '2015-03-18T16:59:00Z'} |
1.4.0 | GHSA-c8mg-wp7h-f2pf | 2023-07-24T23:49:05Z | 2022-05-14T02:57:59Z | null | ['CVE-2018-14835'] | Subrion CMS XSS | Subrion CMS v4.2.1 is vulnerable to Stored XSS because of no escaping added to the tooltip information being displayed in multiple areas. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14835'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/760'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/pull/763/commits'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T23:49:05Z', 'nvd_published_at': '2018-08-02T00:29:00Z'} |
1.4.0 | GHSA-vqf9-v3hc-wr54 | 2023-07-26T21:09:36Z | 2022-05-14T00:55:07Z | null | ['CVE-2017-15111'] | keycloak-httpd-client-install symlink attack vulnerability | keycloak-httpd-client-install versions before 0.8 insecurely creates temporary file allowing local attackers to overwrite other files via symbolic link. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'keycloak-httpd-client-install'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15111'}, {'type': 'WEB', 'url': 'https://github.com/jdennis/keycloak-httpd-client-install/commit/07f26e213196936fb328ea0c1d5a66a09d8b5440'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2137'}] | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T21:09:36Z', 'nvd_published_at': '2018-01-20T00:29:00Z'} |
1.4.0 | GHSA-wxvr-vqfp-9cqw | 2022-11-01T23:02:42Z | 2022-05-14T01:03:28Z | null | ['CVE-2016-6346'] | Denial of service in JBoss resteasy | RESTEasy enables GZIPInterceptor, which allows remote attackers to cause a denial of service via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.20.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6346'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/resteasy/pull/1303'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1372120'}, {'type': 'PACKAGE', 'url': 'https://github.com/resteasy/Resteasy'}, {'type': 'WEB', 'ur... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:02:42Z', 'nvd_published_at': '2016-09-07T18:59:00Z'} |
1.4.0 | GHSA-cjw4-2w9r-r8mv | 2023-01-23T20:13:13Z | 2022-05-24T17:00:40Z | null | ['CVE-2019-12410'] | Missing Initialization of Resource in Apache Arrow | While investigating UBSAN errors in https://github.com/apache/arrow/pull/5365 it was discovered Apache Arrow versions 0.12.0 to 0.14.1, left memory Array data uninitialized when reading RLE null data from parquet. This affected the C++, Python, Ruby and R implementations. The uninitialized memory could potentially be s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyarrow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.15.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'red-arrow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.15.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12410'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cjw4-2w9r-r8mv'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/arrow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyarrow/PYSE... | {'cwe_ids': ['CWE-909'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T14:36:30Z', 'nvd_published_at': '2019-11-08T19:15:00Z'} |
1.4.0 | GHSA-3pv3-jj4h-p528 | 2022-06-01T19:42:19Z | 2022-05-13T01:15:09Z | null | ['CVE-2019-1003040'] | Sandbox bypass vulnerability in Jenkins Script Security Plugin | A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.55 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003040'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1423'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/script-security-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-03-25/#SECURI... | {'cwe_ids': ['CWE-470'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:42:19Z', 'nvd_published_at': '2019-03-28T18:29:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.