schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-wmh9-x28j-c6gr | 2022-06-03T15:48:54Z | 2022-05-24T22:29:03Z | null | ['CVE-2021-25974'] | Cross site scripting in publify | In Publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS. A user with a “publisher” role is able to inject and execute arbitrary JavaScript code while creating a page/article. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0'}, {'fixed': '9.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25974'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/fefd5f76302adcc425b2b6e7e7d23587cfc0083e'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vul... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:48:54Z', 'nvd_published_at': '2021-11-10T11:15:00Z'} |
1.4.0 | GHSA-f8qx-mjcq-wfgx | 2022-10-24T16:40:52Z | 2022-05-24T17:26:01Z | null | ['CVE-2020-1597'] | ASP.NET Core Denial of Service Vulnerability | A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka `ASP.NET Core Denial of Service Vulnerability`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.21'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1597'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/162'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT/'}, {'type... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-24T16:40:52Z', 'nvd_published_at': '2020-08-17T19:15:00Z'} |
1.4.0 | GHSA-ph34-pc88-72gc | 2022-06-28T23:53:12Z | 2022-05-13T01:53:21Z | null | ['CVE-2018-7408'] | Incorrect Permission Assignment for Critical Resource in NPM | An issue was discovered in an npm 5.7.0 2018-02-21 pre-release (marked as "next: 5.7.0" and therefore automatically installed by an "npm upgrade -g npm" command, and also announced in the vendor's blog without mention of pre-release status). It might allow local users to bypass intended filesystem access restrictions b... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7408'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm/issues/19883'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm/commit/74e149da6efe6ed89477faa81fef08eee7999ad0'}, {'type': 'PACKAGE', 'url': 'github.com/npm/cli'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:53:12Z', 'nvd_published_at': '2018-02-22T18:29:00Z'} |
1.4.0 | GHSA-cqf7-ff9h-7967 | 2023-09-05T14:08:03Z | 2022-05-17T00:48:30Z | null | ['CVE-2015-5145'] | Django ReDoS in validators.URLValidator | `validators.URLValidator` in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5145'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/8f9a4d3a2bc42f14bb437defd30c7315adbff22c'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://github.com/django/django/blob/4555a8... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T19:54:38Z', 'nvd_published_at': '2015-07-14T17:59:00Z'} |
1.4.0 | GHSA-vwq9-cmqr-3c8c | 2023-03-06T20:49:07Z | 2022-05-24T16:51:50Z | null | ['CVE-2019-10343'] | Insertion of Sensitive Information into Log File in Jenkins Configuration as Code Plugin | Configuration as Code Plugin logs the changes it applies to the Jenkins system log. Secrets such as passwords should be masked (i.e. replaced with asterisks) in that log to prevent accidental disclosure.
Between Configuration as Code Plugin 0.8-alpha and 1.0, log messages contained values if the values were specified ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins:configuration-as-code'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.24'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10343'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/07/31/1'}] | {'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:08:40Z', 'nvd_published_at': '2019-07-31T13:15:00Z'} |
1.4.0 | GHSA-vx7m-v8v2-fhwm | 2023-09-26T19:13:22Z | 2022-05-24T17:00:26Z | null | ['CVE-2019-8131'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code into code field of an inventory source. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8131'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:03:39Z', 'nvd_published_at': '2019-11-06T00:15:00Z'} |
1.4.0 | GHSA-wcrg-92wp-4h28 | 2022-12-21T18:52:12Z | 2022-05-24T17:30:19Z | null | ['CVE-2020-2298'] | XXE vulnerability in Jenkins Nerrvana Plugin | Nerrvana Plugin 1.02.06 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers with Overall/Read permission to have Jenkins parse a crafted HTTP request with XML data that uses external entities for extraction of secrets from the Jenkins controller or server-s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nerrvana-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.02.06'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2298'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/nerrvana-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2097'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:52:12Z', 'nvd_published_at': '2020-10-08T13:15:00Z'} |
1.4.0 | GHSA-8h7p-qjv8-9mp4 | 2022-06-29T19:10:03Z | 2022-05-13T01:19:22Z | null | ['CVE-2018-17060'] | Improper Access Control in Telerik Extensions | Telerik Extensions for ASP.NET MVC (all versions) does not whitelist requests, which can allow a remote attacker to access files inside the server's web directory. NOTE: this product has been obsolete since June 2013. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'TelerikMvcExtensions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2013.1.219'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17060'}, {'type': 'WEB', 'url': 'https://www.telerik.com/support/code-library/security-alert-for-the-obsolete-telerik-extensions-for-asp-net-mvc'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T19:10:03Z', 'nvd_published_at': '2018-10-08T16:29:00Z'} |
1.4.0 | GHSA-rp4x-h577-chvq | 2022-12-15T16:51:41Z | 2022-05-24T19:20:32Z | null | ['CVE-2021-21699'] | Stored XSS vulnerability in Jenkins Active Choices Plugin | Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Active Choices Plugin 2.5.7 escapes references to parameter name... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.biouno:uno-choice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21699'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/active-choices-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-12/#SECURITY-2219'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T16:51:41Z', 'nvd_published_at': '2021-11-12T11:15:00Z'} |
1.4.0 | GHSA-r84v-qff8-jv5g | 2022-07-20T01:27:19Z | 2022-05-24T17:43:20Z | null | ['CVE-2021-26700'] | Remote code execution in vscode-npm-script | Visual Studio Code npm-script Extension Remote Code Execution Vulnerability | [] | [{'package': {'ecosystem': 'npm', 'name': 'vscode-npm-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26700'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/vscode-npm-scripts'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26700'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:27:19Z', 'nvd_published_at': '2021-02-25T23:15:00Z'} |
1.4.0 | GHSA-g4jg-gpwv-p7wv | 2022-07-13T18:41:58Z | 2022-05-17T01:50:09Z | null | ['CVE-2011-5245'] | Exposure of Sensitive Information to an Unauthorized Actor in RESTEasy | The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-5245'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/resteasy/pull/34'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=785631'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/72808'}, {'ty... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:41:58Z', 'nvd_published_at': '2012-11-23T20:55:00Z'} |
1.4.0 | GHSA-8f2x-hv9r-mh9r | 2023-07-18T19:33:47Z | 2022-05-24T17:27:21Z | null | ['CVE-2020-25102'] | silverstripe-advancedreports vulnerable to XSS | silverstripe-advancedreports (aka the Advanced Reports module for SilverStripe) 1.0 through 2.0 is vulnerable to Cross-Site Scripting (XSS) because it is possible to inject and store malicious JavaScript code. The affects `admin/advanced-reports/DataObjectReport/EditForm/field/DataObjectReport/item` (aka report preview... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe-australia/advancedreports'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'last_affected': '2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25102'}, {'type': 'WEB', 'url': 'https://gist.github.com/ahpaleus/c3bd2d41d306544ca3158569335d12f2'}, {'type': 'PACKAGE', 'url': 'https://github.com/nyeholt/silverstripe-advancedreports'}, {'type': 'WEB', 'url': 'https://github.com/nyeholt/silverst... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T19:33:47Z', 'nvd_published_at': '2020-09-03T17:15:00Z'} |
1.4.0 | GHSA-r674-mc9p-hvw5 | 2023-08-29T19:02:10Z | 2022-05-17T04:54:37Z | null | ['CVE-2013-7081'] | TYPO3 Improper Access Control vulnerability | The (old) Form Content Element component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 allows remote authenticated editors to generate arbitrary HMAC signatures and bypass intended access restrictions via unspecified vectors. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.31'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_function... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7081'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/473'}, {'type': 'WEB', 'url': 'http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:02:10Z', 'nvd_published_at': '2013-12-23T23:55:00Z'} |
1.4.0 | GHSA-4c43-cwvx-9crh | 2022-07-06T21:05:15Z | 2022-05-14T01:10:17Z | null | ['CVE-2014-7810'] | Improper Access Control in Apache Tomcat | The Expression Language (EL) implementation in Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.58, and 8.x before 8.0.16 does not properly consider the possibility of an accessible interface implemented by an inaccessible class, which allows attackers to bypass a SecurityManager protection mechanism via a web applicati... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.44'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7810'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:05:15Z', 'nvd_published_at': '2015-06-07T23:59:00Z'} |
1.4.0 | GHSA-g569-49wg-jx5f | 2022-11-08T14:18:19Z | 2022-05-14T03:37:08Z | null | ['CVE-2017-15696'] | Apache Geode configuration request authorization vulnerability | When an Apache Geode cluster before v1.4.0 is operating in secure mode, the Geode configuration service does not properly authorize configuration requests. This allows an unprivileged user who gains access to the Geode locator to extract configuration data and previously deployed application code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15696'}, {'type': 'WEB', 'url': 'https://github.com/apache/geode/pull/1059'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/geode'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/GEODE-3962'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:18:19Z', 'nvd_published_at': '2018-02-26T02:29:00Z'} |
1.4.0 | GHSA-v3c9-w6g2-hjg3 | 2022-06-08T22:27:22Z | 2022-05-24T00:00:18Z | null | ['CVE-2022-29002'] | Cross-Site Request Forgery in XXL-Job | A Cross-Site Request Forgery (CSRF) in XXL-Job v2.3.0 allows attackers to arbitrarily create administrator accounts via the component /gaia-job-admin/user/add. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29002'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/2821'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:27:22Z', 'nvd_published_at': '2022-05-23T21:16:00Z'} |
1.4.0 | GHSA-wxcp-f2c8-x6xv | 2022-07-06T20:06:08Z | 2022-05-13T01:02:15Z | null | ['CVE-2016-0762'] | Observable Discrepancy in Apache Tomcat | The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default config... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0M1'}, {'fixed': '9.0.0.M10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0762'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2247'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:06:08Z', 'nvd_published_at': '2017-08-10T16:29:00Z'} |
1.4.0 | GHSA-p783-gj6m-9r88 | 2023-09-26T19:26:31Z | 2022-05-24T17:00:29Z | null | ['CVE-2019-8150'] | Magento 2 Community Edition RCE Vulnerability | A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with privileges to manipulate layouts and images can insert a malicious payload into the page layout. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8150'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:00:48Z', 'nvd_published_at': '2019-11-06T00:15:00Z'} |
1.4.0 | GHSA-82j9-wfcf-9v2h | 2023-08-09T21:04:54Z | 2022-05-24T17:07:14Z | null | ['CVE-2020-7936'] | Plone Open Redirect Vulnerability | An open redirect on the login form (and possibly other places) in Plone 4.0 through 5.2.1 allows an attacker to craft a link to a Plone Site that, when followed, and possibly after login, will redirect to an attacker's site. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.3.20'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7936'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20200121'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20200121/an-open-redirection-on-the-login-form-and... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T23:52:07Z', 'nvd_published_at': '2020-01-23T21:15:00Z'} |
1.4.0 | GHSA-694v-63fq-fmr4 | 2022-05-18T19:57:37Z | 2022-05-04T00:00:24Z | null | ['CVE-2022-1554'] | Path Traversal in scout-browser | Scout is a Variant Call Format (VCF) visualization interface. The Pypi package `scout-browser` is vulnerable to path traversal due to `send_file` call in versions prior to 4.52. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'scout-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.52'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1554'}, {'type': 'WEB', 'url': 'https://github.com/Clinical-Genomics/scout/issues/3128'}, {'type': 'WEB', 'url': 'https://github.com/Clinical-Genomics/scout/issues/3302'}, {'type': 'WEB', 'url': 'https://github.com/Clinical-Genomics/scout/pull/3303... | {'cwe_ids': ['CWE-22', 'CWE-36'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-18T19:57:37Z', 'nvd_published_at': '2022-05-03T09:15:00Z'} |
1.4.0 | GHSA-4c5w-qqfg-grf3 | 2023-08-01T20:00:06Z | 2022-05-13T01:13:58Z | null | ['CVE-2015-8766'] | Symfony XSS Vulnerabilities | Multiple cross-site scripting (XSS) vulnerabilities in `content/content.systempreferences.php` in Symphony CMS before 2.6.4 allow remote attackers to inject arbitrary web script or HTML via the (1) `email_sendmail[from_name]`, (2) `email_sendmail[from_address]`, (3) `email_smtp[from_name]`, (4) `email_smtp[from_address... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8766'}, {'type': 'WEB', 'url': 'https://github.com/symphonycms/symphony-2/commit/651e150091c61fb60ad1dff2bc2166185a83d9d6'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210321090853/https://cybersecurityworks.com/zerodays/cve-2015-8766-ge... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T20:00:06Z', 'nvd_published_at': '2016-01-08T21:59:00Z'} |
1.4.0 | GHSA-cqmh-mpx2-g633 | 2022-07-08T18:56:28Z | 2022-05-17T05:49:38Z | null | ['CVE-2010-1666'] | Improper Restriction of Operations within the Bounds of a Memory Buffer in python-cjson | Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-cjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-1666'}, {'type': 'WEB', 'url': 'https://github.com/AGProjects/python-cjson/commit/dc2b8781b8666de5ca707318521f554904fdd690'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ubuntu/+source/python-cjson/+bug/585274'}, {'type': 'PACKAGE', 'url': '... | {'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:56:28Z', 'nvd_published_at': '2010-07-02T19:00:00Z'} |
1.4.0 | GHSA-xc4g-7vw8-924h | 2023-02-14T00:51:28Z | 2022-05-17T01:44:00Z | null | ['CVE-2012-3447'] | Arbitrary file overwrite in OpenStack Nova | virt/disk/api.py in OpenStack Compute (Nova) 2012.1.x before 2012.1.2 and Folsom before Folsom-3 allows remote authenticated users to overwrite arbitrary files via a symlink attack on a file in an image that uses a symlink that is only readable by root. NOTE: this vulnerability exists because of an incomplete fix for ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3447'}, {'type': 'WEB', 'url': 'https://github.com/openstack/nova/commit/ce4b2e27be45a85b310237615c47eb53f37bb5f3'}, {'type': 'WEB', 'url': 'https://github.com/openstack/nova/commit/d9577ce9f266166a297488445b5b0c93c1ddb368'}, {'type': 'WEB', 'url':... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:51:28Z', 'nvd_published_at': '2012-08-20T18:55:00Z'} |
1.4.0 | GHSA-qwgm-mxm4-3q2c | 2023-01-24T16:02:54Z | 2022-05-24T22:01:17Z | null | ['CVE-2014-0083'] | net-ldap has weak salt when generating passwords | The Ruby net-ldap gem before 0.16.2 uses a weak salt when generating SSHA passwords. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'net-ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0083'}, {'type': 'WEB', 'url': 'https://github.com/ruby-ldap/ruby-net-ldap/commit/b412ca05f6b430eaa1ce97ac95885b4cf187b04a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0083'}, {'type': 'WEB', 'url': 'https://bugzi... | {'cwe_ids': ['CWE-916'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T16:02:54Z', 'nvd_published_at': '2019-11-21T14:15:00Z'} |
1.4.0 | GHSA-mm32-jw73-9227 | 2023-08-29T18:25:11Z | 2022-05-17T04:49:45Z | null | ['CVE-2013-4194'] | Plone is vulnerable to File System Path Exposure | The WYSIWYG component (wysiwyg.py) in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote attackers to obtain sensitive information via a crafted URL, which reveals the installation path in an error message. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'e... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4194'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978470'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:25:11Z', 'nvd_published_at': '2014-03-11T19:37:00Z'} |
1.4.0 | GHSA-f88q-22g8-frcg | 2023-07-21T22:30:25Z | 2022-05-13T01:48:35Z | null | ['CVE-2018-1000226'] | Cobbler Improper Validation of Security Tokens | Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API (/cobbler_api) that can result in Privilege escalation, data manipulation or exfiltration, LDAP ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000226'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/issues/1916'}, {'type': 'WEB', 'url': 'https://movermeyer.com/2018-08-02-privilege-escalation-exploits-in-cobblers-api/'}] | {'cwe_ids': ['CWE-732'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:30:25Z', 'nvd_published_at': '2018-08-20T20:29:00Z'} |
1.4.0 | GHSA-4262-wr7p-gpcj | 2022-11-22T18:46:01Z | 2022-05-13T01:06:55Z | null | ['CVE-2019-6804'] | Rundeck Community Edition vulnerable to Cross-site Scripting | An XSS issue was discovered on the Job Edit page in Rundeck Community Edition before 3.0.13, related to assets/javascripts/workflowStepEditorKO.js and views/execution/_wfitemEdit.gsp. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6804'}, {'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/issues/4406'}, {'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/commit/e992e94bba22d9fca3a669f0d02c85b80a19f848'}, {'type': 'WEB', 'url': 'https://docs.rundeck.com/docs/hi... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:46:01Z', 'nvd_published_at': '2019-01-25T05:29:00Z'} |
1.4.0 | GHSA-x74x-qf5j-35jh | 2022-06-01T19:41:15Z | 2022-05-13T01:15:09Z | null | ['CVE-2019-1003041'] | Sandbox bypass vulnerability in Jenkins Pipeline: Groovy Plugin | A sandbox bypass vulnerability in Jenkins Pipeline: Groovy Plugin 2.64 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.65'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003041'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1423'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/workflow-cps-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-03-25/#SECURITY-... | {'cwe_ids': ['CWE-470'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:41:15Z', 'nvd_published_at': '2019-03-28T18:29:00Z'} |
1.4.0 | GHSA-wf9g-rh76-6jvr | 2022-07-01T17:37:13Z | 2022-05-13T01:36:54Z | null | ['CVE-2017-2612'] | Incorrect Permission Assignment for Critical Resource in Jenkins | In Jenkins before versions 2.44, 2.32.2 low privilege users were able to override JDK download credentials (SECURITY-392), resulting in future builds possibly failing to download a JDK. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.34'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2612'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/a814154695e23dc37542af7d40cacc129cf70722'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2612'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:37:13Z', 'nvd_published_at': '2018-05-15T20:29:00Z'} |
1.4.0 | GHSA-q74x-qqhr-f8rx | 2023-09-22T23:13:03Z | 2022-05-01T23:37:49Z | null | ['CVE-2008-1232'] | Apache Tomcat Cross-site scripting (XSS) vulnerability | Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.38'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.37'}}, {'package': {'ecosystem': 'M... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-1232'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2008:0648'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2008:0862'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2008:0864'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T23:13:03Z', 'nvd_published_at': '2008-08-04T01:41:00Z'} |
1.4.0 | GHSA-hj36-v72x-cc6j | 2022-12-20T22:37:18Z | 2022-05-24T17:27:06Z | null | ['CVE-2020-2242'] | Missing permission checks in Jenkins Database Plugin | A missing permission check in Jenkins database Plugin 1.6 and earlier allows attackers with Overall/Read access to Jenkins to connect to an attacker-specified database server using attacker-specified credentials.
Database Plugin 1.7 requires Overall/Administer permission for the affected form validation method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2242'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/database-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1024'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:37:18Z', 'nvd_published_at': '2020-09-01T14:15:00Z'} |
1.4.0 | GHSA-6r6h-vhg7-53x7 | 2023-07-06T21:21:16Z | 2022-05-24T17:47:31Z | null | ['CVE-2020-28124'] | Cross Site Scripting (XSS) in LavaLite 5.8.0 | Cross Site Scripting (XSS) in LavaLite 5.8.0 via the Address field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.8.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28124'}, {'type': 'WEB', 'url': 'https://github.com/418sec/cms/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/pull/339'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/pull/339/commits/fe5e71c34d37a601e6208f671e34f04b56... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:21:16Z', 'nvd_published_at': '2021-04-14T18:15:00Z'} |
1.4.0 | GHSA-vx6r-w45x-q3h6 | 2022-12-06T21:39:24Z | 2022-05-24T16:59:37Z | null | ['CVE-2019-10468'] | Jenkins Kubernetes CI/CD Plugin vulnerable to Cross-Site Request Forgery | A cross-site request forgery vulnerability in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
## Note: Jenkins has suspended distribution of th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.elasticbox.jenkins-ci.plugins:kubernetes-ci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10468'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-ci-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/kubernetes-... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:39:24Z', 'nvd_published_at': '2019-10-23T13:15:00Z'} |
1.4.0 | GHSA-vjcm-j85r-7p68 | 2023-08-11T18:38:31Z | 2022-05-24T17:09:34Z | null | ['CVE-2020-5188'] | DNN File Upload Vulnerability | DNN (formerly DotNetNuke) through 9.4.4 has a File upload vulnerability via bypassing client-side file extension check | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5188'}, {'type': 'PACKAGE', 'url': 'https://github.com/dnnsoftware/Dnn.Platform'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/releases'}, {'type': 'WEB', 'url': 'https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-s... | {'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T21:30:08Z', 'nvd_published_at': '2020-02-24T15:15:00Z'} |
1.4.0 | GHSA-38x2-fp9m-87mx | 2022-07-07T23:07:00Z | 2022-05-13T01:09:20Z | null | ['CVE-2014-0034'] | Improper Input Validation in Apache CXF | The SecurityTokenService (STS) in Apache CXF before 2.6.12 and 2.7.x before 2.7.9 does not properly validate SAML tokens when caching is enabled, which allows remote attackers to gain access via an invalid SAML token. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-ws-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-ws-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0034'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc7... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:07:00Z', 'nvd_published_at': '2014-07-07T14:55:00Z'} |
1.4.0 | GHSA-w7rq-8f2g-jvqr | 2023-08-16T22:22:45Z | 2022-05-17T03:50:02Z | null | ['CVE-2014-3994'] | Djiblets Cross-site scripting Vulnerability via JSON Objects | A cross-site scripting (XSS) vulnerability in `util/templatetags/djblets_js.py` in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Djblets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.30'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Djblets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3994'}, {'type': 'WEB', 'url': 'https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd'}, {'type': 'WEB', 'url': 'https://github.com/djblets/djblets/commit/77a68c03cd619a0996f3f37337b8c39ca6643d6e'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:22:45Z', 'nvd_published_at': '2014-06-16T18:55:00Z'} |
1.4.0 | GHSA-89hj-xfx5-7q66 | 2023-09-05T13:57:57Z | 2022-05-17T03:07:04Z | null | ['CVE-2014-0473'] | Django Reuses Cached CSRF Token | The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0473'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2014/apr/21/security/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html'}... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:56:38Z', 'nvd_published_at': '2014-04-23T15:55:00Z'} |
1.4.0 | GHSA-v5c9-mmw9-829q | 2022-06-17T21:23:30Z | 2022-05-14T02:39:43Z | null | ['CVE-2008-5619'] | PHPMailer susceptible to arbitrary code execution | html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer before 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-5619'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/commit/8beacc646acb67c995aea10ac5585970efc7355a'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPMailer/PHPMailer/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/expl... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:23:30Z', 'nvd_published_at': '2008-12-17T02:30:00Z'} |
1.4.0 | GHSA-633w-w2pf-x84r | 2022-11-22T18:57:07Z | 2022-05-14T02:46:33Z | null | ['CVE-2016-3089'] | Apache OpenMeetings Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in the SWF panel in Apache OpenMeetings before 3.1.2 allows remote attackers to inject arbitrary web script or HTML via the swf parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3089'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'https://www.apache.org/dist/openmeetings/3.1.2/CHANGELOG'}, {'type': 'WEB', 'url': 'http://openmeetings.apache.org/security.html'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:07Z', 'nvd_published_at': '2016-08-19T21:59:00Z'} |
1.4.0 | GHSA-mqwr-4qf2-2hcv | 2023-03-09T00:39:36Z | 2022-05-13T01:38:26Z | null | ['CVE-2017-0903'] | RubyGems vulnerable to Deserialization of Untrusted Data | RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution. The issue has been patched in 2.6.14. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0903'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bab49'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/274990'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-20... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T00:39:36Z', 'nvd_published_at': '2017-10-11T18:29:00Z'} |
1.4.0 | GHSA-hxvp-655x-xxqv | 2023-08-29T10:35:27Z | 2022-05-17T04:44:31Z | null | ['CVE-2014-0135'] | Kafo allows local users to obtain passwords and other sensitive information by reading default_values.yaml | Kafo before 0.3.17 and 0.4.x before 0.5.2, as used by Foreman, uses world-readable permissions for `default_values.yaml`, which allows local users to obtain passwords and other sensitive information by reading the file. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'kafo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'kafo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0135'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/kafo/CVE-2014-0135.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/theforeman/kafo'}, {'type': 'WEB', 'url': 'http://theforeman.org/security.html'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:09:10Z', 'nvd_published_at': '2014-05-08T14:29:00Z'} |
1.4.0 | GHSA-fxrx-5j36-pwg5 | 2023-08-01T23:30:55Z | 2022-05-24T22:00:06Z | null | ['CVE-2019-1051'] | ChakraCore RCE via Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-20... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1051'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/846e508ea0862846e89ef41e87ecfb73a75ac130'}, {'type... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:30:55Z', 'nvd_published_at': '2019-06-12T14:29:00Z'} |
1.4.0 | GHSA-jphj-5g3m-w7x6 | 2022-11-22T19:22:31Z | 2022-05-14T00:57:52Z | null | ['CVE-2018-11688'] | Ignite Realtime Openfire vulnerable to cross-site scripting | Ignite Realtime Openfire before 3.9.2 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability via a crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11688'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/commit/ed3492a24274fd454afe93a499db49f3d6335108#diff-3f607cf668ad8f1091e789a2c1dca32a'}, {'type': 'PACKAGE', 'url': 'https://github.com/igniterealtime/Openfire'}, {'type': ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:22:31Z', 'nvd_published_at': '2018-06-13T16:29:00Z'} |
1.4.0 | GHSA-5qp6-78pr-gv8c | 2023-08-29T18:03:31Z | 2022-05-17T03:46:28Z | null | ['CVE-2013-4701'] | PHP OpenID Library Denial of Service vulnerability | Auth/Yadis/XML.php in PHP OpenID Library 2.2.2 and earlier allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via XRDS data containing an external entity declaration in conjunction with an entity reference, related to an XML... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'openid/php-openid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4701'}, {'type': 'WEB', 'url': 'https://github.com/openid/php-openid/commit/625c16bb28bb120d262b3f19f89c2c06cb9b0da9'}, {'type': 'PACKAGE', 'url': 'https://github.com/openid/php-openid'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN24713981/inde... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:03:31Z', 'nvd_published_at': '2013-08-21T16:55:00Z'} |
1.4.0 | GHSA-v6q8-8wgx-8hm7 | 2023-09-28T20:45:04Z | 2022-05-14T01:38:22Z | null | ['CVE-2019-7171'] | Croogo vulnerable to XSS in title field | A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/blocks/blocks/edit/8. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7171'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/issues/887'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/commit/cafaaabe2cef3d1d83652370e30563e6ad7c4158'}, {'type': 'PACKAGE', 'url': 'https://github.com/croogo/croogo'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:24:09Z', 'nvd_published_at': '2019-01-29T18:29:00Z'} |
1.4.0 | GHSA-r69c-5j7c-vm6q | 2022-07-01T18:00:19Z | 2022-05-13T01:02:35Z | null | ['CVE-2017-2601'] | Cross-site Scripting in Jenkins | Jenkins before versions 2.44 and 2.32.2 is vulnerable to a persisted cross-site scripting in parameter names and descriptions (SECURITY-353). Users with the permission to configure jobs were able to inject JavaScript into parameter names and descriptions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.32.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2601'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/fd2e081b947124c90bcd97bfc55e1a7f2ef41a74'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2601'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T18:00:19Z', 'nvd_published_at': '2018-05-10T13:29:00Z'} |
1.4.0 | GHSA-rm7r-xv53-xwc3 | 2022-12-22T13:41:28Z | 2022-05-24T17:33:08Z | null | ['CVE-2020-2314'] | Password stored in plain text by Jenkins AppSpider Plugin | AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file `com.rapid7.jenkinspider.PostBuildScan.xml` on the Jenkins controller as part of its configuration.
This password can be viewed by users with access to the Jenkins controller file system.
AppSpider Plugin 1.0.13 stores ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.rapid7:jenkinsci-appspider-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2314'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/appspider-build-scanner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2058'}] | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:41:28Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-jvxx-8xxf-5495 | 2023-07-31T21:44:50Z | 2022-05-17T02:36:23Z | null | ['CVE-2016-9866'] | phpMyAdmin CSRF Vulnerability | An issue was discovered in phpMyAdmin. When the arg_separator is different from its default & value, the CSRF token was not properly stripped from the return URL of the preference import action. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4'}, {'fixed': '4.4.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9866'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123194736/http://www.securityfocus.com/bid/94536'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/P... | {'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:44:50Z', 'nvd_published_at': '2016-12-11T03:00:00Z'} |
1.4.0 | GHSA-cf46-6xxh-pc75 | 2023-03-08T19:57:56Z | 2022-05-24T16:49:07Z | null | ['CVE-2019-13118'] | libxslt Type Confusion vulnerability that affects Nokogiri | In `numbers.c` in libxslt 1.1.33, a type holding grouping characters of an `xsl:number` instruction was too narrow and an invalid character/length combination could be passed to `xsltNumberFormatDecimal`, leading to a read of uninitialized stack data.
Nokogiri prior to version 1.10.5 used a vulnerable version of libxs... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13118'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1943'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/43a175339b47b8c604508813fc75b83f13cd173e'}, {'type': 'WEB', 'url': 'https://bugs.chro... | {'cwe_ids': ['CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T19:57:56Z', 'nvd_published_at': '2019-07-01T02:15:00Z'} |
1.4.0 | GHSA-vcr8-h8qp-qj8h | 2022-06-28T22:29:22Z | 2022-05-24T16:55:01Z | null | ['CVE-2019-10384'] | Cross-Site Request Forgery in Jenkins | Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.176.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.176.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10384'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2789'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3144'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1491'},... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:29:22Z', 'nvd_published_at': '2019-08-28T16:15:00Z'} |
1.4.0 | GHSA-5f5r-65pm-r3wr | 2023-07-27T19:49:30Z | 2022-05-17T00:11:58Z | null | ['CVE-2017-11916'] | ChakraCore RCE Vulnerability | ChakraCore allows an attacker to execute arbitrary code in the context of the current user, due to how the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11916'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4411'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/69e03c35543d2bf3befce6885d78cd751bf5db10'}, {'type': 'WEB', 'url': 'https://portal.msrc... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:49:30Z', 'nvd_published_at': '2017-12-12T21:29:00Z'} |
1.4.0 | GHSA-r4mw-gxf7-vxr9 | 2022-07-28T22:08:12Z | 2022-05-24T17:06:16Z | null | ['CVE-2020-0606'] | Remote code execution in Microsoft.WindowsDesktop.App.Ref | A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Framework Remote Code Execution Vulnerability'. This CVE ID is unique... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Ref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.1'}, {'fixed': '3.0.2'}]}], 'versions': ['3.0.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Ref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0606'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/149'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidanc... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-28T22:08:12Z', 'nvd_published_at': '2020-01-14T23:15:00Z'} |
1.4.0 | GHSA-r6fx-55x3-f9x6 | 2023-09-12T13:30:02Z | 2022-05-17T00:00:34Z | null | ['CVE-2021-23267'] | Crafter CMS Crafter Studio vulnerable to Improper Control of Dynamically-Managed Code Resources | Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker static methods. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23267'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2022051603'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftercms/studio'}] | {'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T13:44:50Z', 'nvd_published_at': '2022-05-16T17:15:00Z'} |
1.4.0 | GHSA-4wx5-c723-xvwv | 2022-12-16T23:00:33Z | 2022-05-24T17:15:35Z | null | ['CVE-2020-2177'] | Credentials stored in plain text by Jenkins Copr Plugin | Copr Plugin 0.3 and earlier stores credentials unencrypted in job `config.xml` files as part of its configuration. These credentials can be viewed by users with Extended Read permission or access to the Jenkins controller file system.
Copr Plugin 0.6.1 stores these credentials encrypted. This change is effective once ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.fedoraproject.jenkins.plugins:copr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2177'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/copr-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-04-16/#SECURITY-1556'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/04/16/... | {'cwe_ids': ['CWE-256', 'CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T23:00:33Z', 'nvd_published_at': '2020-04-16T19:15:00Z'} |
1.4.0 | GHSA-66vj-393f-hxfv | 2023-02-08T19:57:23Z | 2022-05-17T04:04:46Z | null | ['CVE-2014-3497'] | OpenStack Swift Cross-site Scriping vulnerability | Cross-site scripting (XSS) vulnerability in OpenStack Swift 1.11.0 through 1.13.1 allows remote attackers to inject arbitrary web script or HTML via the WWW-Authenticate header. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.13.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3497'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0941'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-3497'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1110809'}, {'type... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T19:57:23Z', 'nvd_published_at': '2014-07-03T17:55:00Z'} |
1.4.0 | GHSA-49j7-qghp-5wj8 | 2022-07-08T19:07:06Z | 2022-05-17T04:17:07Z | null | ['CVE-2013-2035'] | Improper Control of Generation of Code in HawtJNI | Race condition in hawtjni-runtime/src/main/java/org/fusesource/hawtjni/runtime/Library.java in HawtJNI before 1.8, when a custom library path is not specified, allows local users to execute arbitrary Java code by overwriting a temporary JAR file with a predictable name in /tmp. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.fusesource.hawtjni:hawtjni-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2035'}, {'type': 'WEB', 'url': 'https://github.com/jline/jline2/issues/85'}, {'type': 'WEB', 'url': 'https://github.com/jruby/jruby/issues/732'}, {'type': 'WEB', 'url': 'https://github.com/fusesource/hawtjni/commit/92c266170ce98edc200c656bd034a2370... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:07:06Z', 'nvd_published_at': '2013-08-28T23:55:00Z'} |
1.4.0 | GHSA-9986-w5h5-vw59 | 2023-08-03T17:32:50Z | 2022-05-02T03:26:04Z | null | ['CVE-2009-1523'] | Directory traversal in Mort Bay Jetty | Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 5.1.14, 6.x before 6.1.17, and 7.x through 7.0.0.M2 allows remote attackers to access arbitrary files via directory traversal sequences in the URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0.M0'}, {'fixed': '7.0.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-1523'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=499867'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01257.html'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T17:32:50Z', 'nvd_published_at': '2009-05-05T17:30:00Z'} |
1.4.0 | GHSA-fg52-xjfc-9rh8 | 2022-12-16T14:34:49Z | 2022-05-24T16:51:37Z | null | ['CVE-2019-1020002'] | Pterodactyl vulnerable to 2FA Sniffing | **Pterodactyl version 0.7.13 and lower - 2FA Sniffing**
Users who have enabled 2FA protections on their account can unintentionally have their account's existence sniffed by malicious users who enter random credentials into the login fields.
### Impact
Users who have enabled 2FA protections on their account can unint... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.13'}}] | [{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-vcm9-hx3q-qwj8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020002'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/commit/092e7e79fff858ee026608c7dbccab165a67526f'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T14:34:49Z', 'nvd_published_at': '2019-07-29T15:15:00Z'} |
1.4.0 | GHSA-xf9f-32gh-h2w4 | 2022-07-13T14:04:46Z | 2022-05-13T01:09:21Z | null | ['CVE-2012-5633'] | Improper Authentication in Apache CXF | The URIMappingInterceptor in Apache CXF before 2.5.8, 2.6.x before 2.6.5, and 2.7.x before 2.7.2, when using the WSS4JInInterceptor, bypasses WS-Security processing, which allows remote attackers to obtain access to SOAP services via an HTTP GET request. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.5'}]}]}, {'pac... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5633'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/81980'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CXF-4629'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/JBWS-3575'}, {'type': 'W... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T14:04:46Z', 'nvd_published_at': '2013-03-12T23:55:00Z'} |
1.4.0 | GHSA-q58j-fhj7-j6fg | 2022-12-16T22:58:21Z | 2022-05-24T19:19:43Z | null | ['CVE-2021-21698'] | Path traversal vulnerability in Jenkins Subversion Plugin allows reading arbitrary files | Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent.
This allows attackers able to control agent processes to read arbitrary files on the Jenkins controller file system.
Subversion Plugin 2.15.1 checks for the presence of and ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.15.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21698'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2506'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T22:58:21Z', 'nvd_published_at': '2021-11-04T17:15:00Z'} |
1.4.0 | GHSA-m7r6-43v2-49vf | 2023-09-21T23:19:53Z | 2022-05-01T18:44:39Z | null | ['CVE-2007-6612'] | Mongrel vulnerable to directory traversal via double-encoded sequences | Directory traversal vulnerability in DirHandler (lib/mongrel/handlers.rb) in Mongrel 1.0.4 (1.0.3 and prior are not affected) and 1.1.x before 1.1.3 allows remote attackers to read arbitrary files via an HTTP request containing double-encoded sequences (`.%252e`). | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'mongrel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.4'}, {'fixed': '1.0.5'}]}], 'versions': ['1.0.4']}, {'package': {'ecosystem': 'RubyGems', 'name': 'mongrel'}, 'ecosystem_specific': {'affected_fu... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6612'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongrel/mongrel'}, {'type': 'WEB', 'url': 'https://lists.apple.com/archives/security-announce/2008//May/msg00001.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080111034049/http:... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T23:19:53Z', 'nvd_published_at': '2008-01-03T22:46:00Z'} |
1.4.0 | GHSA-f866-m9mv-2xr3 | 2022-07-20T17:04:59Z | 2022-05-14T02:54:56Z | null | ['CVE-2011-2894'] | Spring Framework and Spring Security vulnerable to Deserialization of Untrusted Data | Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and u... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2894'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/69687'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120307233721/http://www.springsource.com/security/cve-2011-2894'}, {'type': 'WEB', 'url': 'http://os... | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:57:50Z', 'nvd_published_at': '2011-10-04T10:55:00Z'} |
1.4.0 | GHSA-mq4x-8whh-jx73 | 2022-06-08T22:32:53Z | 2022-05-01T07:02:10Z | null | ['CVE-2006-2759'] | Improper Input Validation in Mortbay Jetty | jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary script source code via a capital P in the .jsp extension, and probably other mixed case manipulations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-2759'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://www.eclipse.org/jetty/about.php'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:32:53Z', 'nvd_published_at': '2006-06-02T01:02:00Z'} |
1.4.0 | GHSA-ccmr-qj26-845g | 2022-06-28T23:22:46Z | 2022-05-13T01:34:04Z | null | ['CVE-2018-17247'] | Improper Restriction of XML External Entity Reference in Elasticsearch | Elasticsearch Security versions 6.5.0 and 6.5.1 contain an XXE flaw in Machine Learning's find_file_structure API. If a policy allowing external network access has been added to Elasticsearch's Java Security Manager then an attacker could send a specially crafted request capable of leaking content of local files on the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.5.0'}, {'fixed': '6.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17247'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-6-5-2-security-update/159594'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106294'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:22:46Z', 'nvd_published_at': '2018-12-20T22:29:00Z'} |
1.4.0 | GHSA-8vh5-j6xj-5953 | 2023-07-22T00:07:35Z | 2022-05-14T00:55:27Z | null | ['CVE-2018-19311'] | Centreon XSS Vulnerability | Centreon 3.4.x (fixed in Centreon 18.10.0) allows XSS via the Service field to the `main.php?p=20201` URI, as demonstrated by the "Monitoring > Status Details > Services" screen. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '18.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19311'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6632'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-22T00:07:35Z', 'nvd_published_at': '2018-11-16T19:29:00Z'} |
1.4.0 | GHSA-hx44-c87v-p6xg | 2022-11-08T21:57:59Z | 2022-05-13T01:40:59Z | null | ['CVE-2017-1000221'] | Opencast has Incorrect Permission Assignment | In Opencast 2.2.3 and older if user names overlap, the Opencast search service used for publication to the media modules and players will handle the access control incorrectly so that users only need to match part of the user name used for the access restriction. For example, a user with the role ROLE_USER will have ac... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000221'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/f1abcaf998a469a2081461e0e3b4211927849439'}, {'type': 'WEB', 'url': 'https://opencast.jira.com/browse/MH-11862'}] | {'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T21:57:59Z', 'nvd_published_at': '2017-11-17T22:29:00Z'} |
1.4.0 | GHSA-qx3p-9mmp-4v8h | 2023-08-23T13:48:00Z | 2022-05-24T17:35:40Z | null | ['CVE-2020-27822'] | Wildfly has a memory leak vulnerability | A flaw was found in Wildfly affecting versions 19.0.0.Final, 19.1.0.Final, 20.0.0.Final, 20.0.1.Final, and 21.0.0.Final. When an application uses the OpenTracing API's java-interceptors, there is a possibility of a memory leak. This flaw allows an attacker to impact the availability of the server. The highest threat fr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0.Final'}, {'fixed': '21.0.2.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-parent'}, 'ecosystem_s... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27822'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly/pull/13749'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly/pull/13779'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly/commit/67ef84fd7aab789a535b137e5e5... | {'cwe_ids': ['CWE-401'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T22:38:36Z', 'nvd_published_at': '2020-12-08T01:15:00Z'} |
1.4.0 | GHSA-h8pc-j334-jjhm | 2022-05-25T19:44:25Z | 2022-05-19T00:00:30Z | null | ['CVE-2022-1432'] | Cross-site Scripting in OctoPrint | Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0. The Stream URL of octoprint application allowing a xss payload to execute. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'octoprint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1432'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/6d259d7e6f5b0de9a1c762831537a386e53978d3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h8pc-j334-jjhm'}, {'type': 'PACKAGE', 'url': 'https://github.c... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:44:25Z', 'nvd_published_at': '2022-05-18T14:15:00Z'} |
1.4.0 | GHSA-pjch-4g28-fxx7 | 2022-05-24T20:58:43Z | 2022-05-07T00:00:31Z | null | ['CVE-2021-23792'] | External Entity Reference in TwelveMonkeys ImageIO | The package com.twelvemonkeys.imageio:imageio-metadata before version 3.7.1 is vulnerable to XML External Entity (XXE) Injection due to an insecurely initialized XML parser for reading XMP Metadata. An attacker can exploit this vulnerability if they are able to supply a file (e.g. when an online profile picture is proc... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.twelvemonkeys.imageio:imageio-metadata'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23792'}, {'type': 'WEB', 'url': 'https://github.com/haraldk/TwelveMonkeys/commit/da4efe98bf09e1cce91b7633cb251958a200fc80'}, {'type': 'PACKAGE', 'url': 'https://github.com/haraldk/TwelveMonkeys'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-J... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T20:58:43Z', 'nvd_published_at': '2022-05-06T20:15:00Z'} |
1.4.0 | GHSA-w47g-4vrc-m3w2 | 2022-11-03T18:45:55Z | 2022-05-24T16:44:43Z | null | ['CVE-2019-0186'] | Cross-site Scripting in Apache Pluto Chatroom demo | The input fields of the Apache Pluto "Chat Room" demo portlet 3.0.0 and 3.0.1 are vulnerable to Cross-Site Scripting (XSS) attacks. Mitigation: * Uninstall the ChatRoomDemo war file - or - * migrate to version 3.1.0 of the chat-room-demo war file | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.pluto:chatRoomDemo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0186'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d093e6b0e5f9b3b50928255451afefd8f8fbdcd5bf28a726769a919a@%3Cpluto-user.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://portals.apache.org/pluto/security.html'}, {'type': ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:45:55Z', 'nvd_published_at': '2019-04-26T16:29:00Z'} |
1.4.0 | GHSA-6cpj-3g83-q2j4 | 2022-07-12T21:32:13Z | 2022-05-17T04:50:16Z | null | ['CVE-2012-6612'] | Improper Restriction of XML External Entity Reference in Apache Solr | The (1) UpdateRequestHandler for XSLT or (2) XPathEntityProcessor in Apache Solr before 4.1 allows remote attackers to have an unspecified impact via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, different vectors than CVE-2013... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6612'}, {'type': 'WEB', 'url': 'https://github.com/apache/lucene-solr/commit/0d21b900975b7048d2e925d852aeacb9bdc6766c'}, {'type': 'WEB', 'url': 'https://github.com/apache/lucene-solr/commit/f230486ce6707762c1a6e81655d0fac52887906d'}, {'type': 'PACK... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:32:13Z', 'nvd_published_at': '2013-12-07T21:55:00Z'} |
1.4.0 | GHSA-vrwc-qjmw-5rjm | 2022-11-03T22:54:35Z | 2022-05-14T00:54:15Z | null | ['CVE-2014-0094'] | ClassLoader manipulation in Apache Struts | The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to "manipulate" the ClassLoader via the class parameter, which is passed to the getClass method. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.16.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0094'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN19294237/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045'}, {'type': 'WEB', 'url': 'http://pack... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:54:35Z', 'nvd_published_at': '2014-03-11T13:00:00Z'} |
1.4.0 | GHSA-8884-xcr4-r68p | 2022-11-01T21:39:24Z | 2022-05-17T00:19:03Z | null | ['CVE-2017-8585'] | Improper Input Validation in Microsoft.NETCore.App | Microsoft .NET Framework 4.6, 4.6.1, 4.6.2, and 4.7 allow an attacker to send specially crafted requests to a .NET web application, resulting in denial of service, aka .NET Denial of Service Vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.7'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8585'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/corefx/issues/24703'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3248'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/C... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:39:24Z', 'nvd_published_at': '2017-07-11T21:29:00Z'} |
1.4.0 | GHSA-mhq6-h9m7-wq8c | 2023-02-23T21:51:56Z | 2022-05-24T16:56:46Z | null | ['CVE-2019-10420'] | Jenkins Assembla Plugin has Insufficiently Protected Credentials | Assembla Plugin stores the Assembla password unencrypted in its global configuration file `jenkins.plugin.assembla.AssemblaProjectProperty.xml` on the Jenkins controller. This password can be viewed by users with access to the Jenkins controller file system.
As of publication of this advisory, there is no fix. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:assembla'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10420'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1543'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}] | {'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T21:51:56Z', 'nvd_published_at': '2019-09-25T16:15:00Z'} |
1.4.0 | GHSA-5hqc-x78w-3cmw | 2022-06-07T14:47:39Z | 2022-05-26T00:01:31Z | null | ['CVE-2022-29405'] | Missing Authorization in Apache Archiva | In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29405'}, {'type': 'WEB', 'url': 'https://archiva.apache.org/docs/2.2.8/release-notes.html'}] | {'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:26:54Z', 'nvd_published_at': '2022-05-25T08:15:00Z'} |
1.4.0 | GHSA-pw34-qf6c-84fc | 2023-07-28T20:49:36Z | 2022-05-14T02:08:30Z | null | ['CVE-2016-2040'] | phpMyAdmin XSS Vulnerability | Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.13, 4.4.x before 4.4.15.3, and 4.5.x before 4.5.4 allow remote authenticated users to inject arbitrary web script or HTML via a (1) table name, (2) SET value, (3) search query, or (4) hostname in a Location header. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.10.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'af... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2040'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/75a55824012406a08c4debf5ddb7ae41c32a7dbc'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/aca42efa01917cc0fe8cfdb2927a6399ca1742f2'}, {'type':... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:49:36Z', 'nvd_published_at': '2016-02-20T01:59:00Z'} |
1.4.0 | GHSA-m833-87vf-576c | 2023-08-18T21:25:10Z | 2022-05-13T01:37:34Z | 2023-08-18T21:25:10Z | ['CVE-2017-15113'] | ovirt-engine Logs Plaintext Passwords To File | ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.ovirt.engine.sdk:ovirt-engine-sdk-java'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.7.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15113'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2017:3138'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113'}, {'type': 'WEB', 'url': 'https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git;a=c... | {'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T22:33:08Z', 'nvd_published_at': '2018-07-27T16:29:00Z'} |
1.4.0 | GHSA-v558-fhw2-v46w | 2022-08-30T18:21:15Z | 2022-05-24T22:00:03Z | null | ['CVE-2019-10328'] | Unsafe entry in Script Security list of approved signatures in Pipeline Remote Loader Plugin | Jenkins Pipeline Remote Loader Plugin before 1.5 provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:workflow-remote-loader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10328'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/workflow-remote-loader-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-05-31/#SECURITY-921'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se... | {'cwe_ids': ['CWE-183', 'CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T18:21:15Z', 'nvd_published_at': '2019-05-31T15:29:00Z'} |
1.4.0 | GHSA-mm5c-7mpr-99fm | 2022-12-14T16:22:34Z | 2022-05-24T17:44:48Z | null | ['CVE-2021-21627'] | CSRF vulnerability in Jenkins Libvirt Agents Plugin | Libvirt Agents Plugin 1.9.0 and earlier does not require POST requests for a form submission endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to stop hypervisor domains.
Libvirt Agents Plugin 1.9.1 requires POST requests for the affected HTTP endpoint. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:libvirt-slave'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21627'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/libvirt-slave-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-1764'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T16:22:34Z', 'nvd_published_at': '2021-03-18T14:15:00Z'} |
1.4.0 | GHSA-h9wf-mpvf-9jqg | 2023-07-20T18:22:17Z | 2022-05-13T01:18:32Z | null | ['CVE-2018-0837'] | ChakraCore RCE Vulnerability | Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0837'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/043257b7d47afab1240f5dd4cdd10bde38c574c3'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0837'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:22:17Z', 'nvd_published_at': '2018-02-15T02:29:00Z'} |
1.4.0 | GHSA-rhqj-4pp8-vvgf | 2022-06-30T18:22:46Z | 2022-05-14T01:27:09Z | null | ['CVE-2018-1000130'] | Injection in Jolokia agent | A JNDI Injection vulnerability exists in Jolokia agent version 1.3.7 in the proxy mode that allows a remote attacker to run arbitrary Java code on the server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jolokia:jolokia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.7'}, {'fixed': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000130'}, {'type': 'WEB', 'url': 'https://github.com/rhuss/jolokia/commit/1b360b8889f0ed51165a8d1ac55dd8e0aa2dfd4a'}, {'type': 'WEB', 'url': 'https://github.com/rhuss/jolokia/commit/fd7b93da30c61a45bac10d8b311f1b79a74910f5'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T18:22:46Z', 'nvd_published_at': '2018-03-14T13:29:00Z'} |
1.4.0 | GHSA-8477-3v39-ggpm | 2022-06-28T23:51:50Z | 2022-05-13T01:01:01Z | null | ['CVE-2018-5382'] | Improper Validation of Integrity Check Value in Bouncy Castle | The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where pe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15on'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.50'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5382'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://www.bouncycastle.org/releasenotes.html'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/306792'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-354'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:51:50Z', 'nvd_published_at': '2018-04-16T14:29:00Z'} |
1.4.0 | GHSA-j6p9-hm3q-hwmj | 2022-12-29T01:44:43Z | 2022-05-24T17:28:26Z | null | ['CVE-2020-2268'] | CSRF vulnerability in MongoDB Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins MongoDB Plugin 1.3 and earlier allows attackers to gain access to some metadata of any arbitrary files on the Jenkins controller. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2268'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/mongodb-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1904'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:44:43Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-g32q-4fhf-cq72 | 2023-07-19T23:44:40Z | 2022-05-24T16:45:12Z | null | ['CVE-2018-13983'] | ImpressCMS XSS | ImpressCMS 1.3.10 has XSS via the PATH_INFO to `htdocs/install/index.php`, `htdocs/install/page_langselect.php`, or `htdocs/install/page_modcheck.php`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13983'}, {'type': 'WEB', 'url': 'https://www.netsparker.com/web-applications-advisories/ns-18-033-cross-site-scripting-in-impresscms/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/150990/ImpressCMS-1.3.10-Cross-Site-Scripting.html... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T23:44:40Z', 'nvd_published_at': '2019-05-06T19:29:00Z'} |
1.4.0 | GHSA-qmh2-h7r6-gm6q | 2022-07-13T21:25:16Z | 2022-05-17T02:54:07Z | null | ['CVE-2012-3376'] | Client BlockTokens not checked in Apache Hadoop | DataNodes in Apache Hadoop 2.0.0 alpha does not check the BlockTokens of clients when Kerberos is enabled and the DataNode has checked out the same BlockPool twice from a NodeName, which might allow remote clients to read arbitrary blocks, write to blocks to which they only have read access, and have other unspecified ... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha'}, {'fixed': '2.0.1-alpha'}]}], 'versions': ['2.0.0-alpha']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3376'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2012/Jul/78'}, {'type': 'WEB', 'url': 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_to... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T21:25:16Z', 'nvd_published_at': '2012-07-12T19:55:00Z'} |
1.4.0 | GHSA-qvhf-3567-pc4v | 2023-01-05T20:11:47Z | 2022-05-24T17:10:27Z | null | ['CVE-2020-2135'] | Sandbox bypass vulnerability in Script Security Plugin | Sandbox protection in Script Security Plugin 1.70 and earlier can be circumvented through:\n- Crafted constructor calls and bodies (due to an incomplete fix of [SECURITY-582](https://www.jenkins.io/security/advisory/2017-08-07/#super-constructor-calls))
- Crafted method calls on objects that implement `GroovyIntercepta... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.71'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.70'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2135'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/script-security-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1754'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/... | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T20:11:47Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
1.4.0 | GHSA-876p-4wgc-75rx | 2023-07-28T21:26:42Z | 2022-05-14T00:52:12Z | null | ['CVE-2016-0785'] | Apache Struts RCE Vulnerability | Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a `%{}` sequence in a tag attribute, aka forced double OGNL evaluation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.3.28'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0785'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123095715/http://www.securityfocus.com/bid/85066'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220118185853/http://www.securitytracker.com/id/1035271'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T21:26:42Z', 'nvd_published_at': '2016-04-12T16:59:00Z'} |
1.4.0 | GHSA-f3qw-7p9p-j87f | 2023-07-21T19:20:01Z | 2022-05-13T01:20:58Z | null | ['CVE-2018-8555'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8555'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5827'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/8943e332ea5c8d7bf7d89301b30a1412e318ae97'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:20:01Z', 'nvd_published_at': '2018-11-14T01:29:00Z'} |
1.4.0 | GHSA-j3cq-h6vh-gx7f | 2022-12-16T20:30:17Z | 2022-05-24T19:19:44Z | null | ['CVE-2021-21689'] | Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins | The agent-to-controller security subsystem limits which files on the Jenkins controller can be accessed by agent processes.
Multiple vulnerabilities in the file path filtering implementation of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allow agent processes to read and write arbitrary files on the Jenkins con... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.303.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.304'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21689'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455'}] | {'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:48:33Z', 'nvd_published_at': '2021-11-04T17:15:00Z'} |
1.4.0 | GHSA-254q-rp36-v2m8 | 2022-07-08T19:08:08Z | 2022-05-13T01:09:20Z | null | ['CVE-2013-2160'] | Missing XML Validation in Apache CXF | The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-frontend-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-frontend-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2160'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=929197'}, {'type': 'WEB', 'url': 'https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e... | {'cwe_ids': ['CWE-112'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:08:08Z', 'nvd_published_at': '2013-08-19T23:55:00Z'} |
1.4.0 | GHSA-6q4j-8pjm-5mgc | 2023-08-11T18:53:13Z | 2022-05-24T17:10:09Z | null | ['CVE-2020-9757'] | SEOmatic for CraftCMS allows Server-Side Template Injection | The Seomatic component before 3.2.46 for Craft CMS allows Server-Side Template Injection and information disclosure via malformed data to the metacontainers controller. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nystudio107/craft-seomatic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9757'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/65ab659cb6c914c7ad671af1e417c0da2431f79b'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/a1c2cad7e126132d2442ec8ec8e9ab43df02cc0f'}... | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T21:45:20Z', 'nvd_published_at': '2020-03-04T17:15:00Z'} |
1.4.0 | GHSA-vvf9-fxhv-4rgj | 2023-09-25T19:14:36Z | 2022-05-24T16:52:28Z | null | ['CVE-2019-7942'] | Magento 2 Community Edition RCE | A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with admin privileges to create or edit a product can execute arbitrary code via malicious XML layout updates. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7942'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:20:20Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-8p5c-f836-m4h7 | 2023-09-26T19:28:50Z | 2022-05-24T17:00:29Z | null | ['CVE-2019-8158'] | Magento 2 Community Edition XML Injection | An XPath entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An attacker can craft a GET request to page cache block rendering module that gets passed to XML data processing engine without validation. The crafted key/value GET request data allows an attacker to ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8158'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-91'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:15:33Z', 'nvd_published_at': '2019-11-06T01:15:00Z'} |
1.4.0 | GHSA-vwhv-j36g-5rm8 | 2022-11-03T23:01:19Z | 2022-05-14T01:57:02Z | null | ['CVE-2015-5169'] | Cross-site Scripting in Apache Struts | When the Struts2 debug mode is turned on, under certain conditions an arbitrary script may be executed in the 'Problem Report' screen. Also if JSP files are exposed to be accessed directly it's possible to execute an arbitrary script.
It is generally not advisable to have debug mode switched on outside of the develop... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5169'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1260087'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180629-0003/'}, {'type': 'WEB... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:01:19Z', 'nvd_published_at': '2017-09-25T21:29:00Z'} |
1.4.0 | GHSA-v4mq-p756-p4f5 | 2022-11-22T19:45:54Z | 2022-05-13T01:30:27Z | null | ['CVE-2018-13864'] | Play Framework's Assets controller vulnerable to directory traversal | A directory traversal vulnerability has been found in the Assets controller in Play Framework 2.6.12 through 2.6.15 (fixed in 2.6.16) when running on Windows. It allows a remote attacker to download arbitrary files from the target server via specially crafted HTTP requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.12'}, {'fixed': '2.6.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13864'}, {'type': 'WEB', 'url': 'https://discuss.lightbend.com/t/play-2-6-16-released/1575'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability/CVE-2018-13864-PathTraversal'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:45:54Z', 'nvd_published_at': '2018-07-17T12:29:00Z'} |
1.4.0 | GHSA-6j22-wv8g-894f | 2022-05-19T20:29:04Z | 2022-05-19T20:29:04Z | null | ['CVE-2022-29230'] | Potential Cross-site Scripting vulnerability in Hydrogen | ### Impact
There is a potential Cross-Site Scripting (XSS) vulnerability where an arbitrary user is able to execute scripts on pages that are built with Hydrogen. This affects all versions of Hydrogen starting from version 0.10.0 to 0.18.0. This vulnerability is exploitable in applications whose hydrating data is user ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': '@shopify/hydrogen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.19.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Shopify/hydrogen/security/advisories/GHSA-6j22-wv8g-894f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29230'}, {'type': 'WEB', 'url': 'https://github.com/Shopify/hydrogen/pull/1272'}, {'type': 'PACKAGE', 'url': 'https://github.com/Shopify/hydrogen... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-19T20:29:04Z', 'nvd_published_at': '2022-05-18T21:15:00Z'} |
1.4.0 | GHSA-9cqh-5x6g-wgm9 | 2022-11-01T22:36:28Z | 2022-05-17T00:36:06Z | null | ['CVE-2016-8744'] | Deserialization of Untrusted Data in Apache Brooklyn | Apache Brooklyn uses the SnakeYAML library for parsing YAML inputs. SnakeYAML allows the use of YAML tags to indicate that SnakeYAML should unmarshal data to a Java type. In the default configuration in Brooklyn before 0.10.0, SnakeYAML will allow unmarshalling to any Java type available on the classpath. This could pr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.brooklyn:brooklyn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8744'}, {'type': 'WEB', 'url': 'https://brooklyn.apache.org/community/security/CVE-2016-8744.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f4d09c1c1a3cdfd1da0a05c8362769b917c078eed5b6c2f8e37a761@%3Cdev.brooklyn.apache.org%3E... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:36:28Z', 'nvd_published_at': '2017-09-13T16:29:00Z'} |
1.4.0 | GHSA-738x-v49g-p6hx | 2023-08-23T18:40:14Z | 2022-05-24T17:26:55Z | null | ['CVE-2020-24715'] | Scalyr Agent 2 Missing SSL Certificate Validation | The Scalyr Agent before 2.1.10 has Missing SSL Certificate Validation because, in some circumstances, native Python code is used that lacks a comparison of the hostname to commonName and subjectAltName. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'scalyr-agent-2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24715'}, {'type': 'PACKAGE', 'url': 'https://github.com/scalyr/scalyr-agent-2'}, {'type': 'WEB', 'url': 'https://github.com/scalyr/scalyr-agent-2/blob/v2.1.10/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211209045826/https:... | {'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T20:29:13Z', 'nvd_published_at': '2020-08-27T22:15:00Z'} |
1.4.0 | GHSA-wrrj-r2j4-969w | 2023-07-24T20:54:51Z | 2022-05-14T01:44:31Z | null | ['CVE-2018-17256'] | Umbraco CMS vulnerable to stored XSS | Persistent cross-site scripting (XSS) vulnerability in Umbraco CMS 7.12.3 allows authenticated users to inject arbitrary web script via the Header Name of a content (Blog, Content Page, etc.). The vulnerability is exploited when updating or removing public access of a content. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'umbraco'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.12.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17256'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T20:54:51Z', 'nvd_published_at': '2018-11-27T19:29:00Z'} |
1.4.0 | GHSA-g2fm-x3cp-mqw9 | 2022-11-01T22:59:30Z | 2022-05-14T01:05:57Z | null | ['CVE-2016-8748'] | Cross-site Scripting in Apache NiFi | In Apache NiFi before 1.0.1 and 1.1.x before 1.1.1, there is a cross-site scripting vulnerability in connection details dialog when accessed by an authorized user. The user supplied text was not being properly handled when added to the DOM. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8748'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2016-8748'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95621'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:59:30Z', 'nvd_published_at': '2017-10-19T20:29:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.