schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-wmh9-x28j-c6gr
2022-06-03T15:48:54Z
2022-05-24T22:29:03Z
null
['CVE-2021-25974']
Cross site scripting in publify
In Publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS. A user with a “publisher” role is able to inject and execute arbitrary JavaScript code while creating a page/article.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0'}, {'fixed': '9.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25974'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/fefd5f76302adcc425b2b6e7e7d23587cfc0083e'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vul...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:48:54Z', 'nvd_published_at': '2021-11-10T11:15:00Z'}
1.4.0
GHSA-f8qx-mjcq-wfgx
2022-10-24T16:40:52Z
2022-05-24T17:26:01Z
null
['CVE-2020-1597']
ASP.NET Core Denial of Service Vulnerability
A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka `ASP.NET Core Denial of Service Vulnerability`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.21'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1597'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/162'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT/'}, {'type...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-24T16:40:52Z', 'nvd_published_at': '2020-08-17T19:15:00Z'}
1.4.0
GHSA-ph34-pc88-72gc
2022-06-28T23:53:12Z
2022-05-13T01:53:21Z
null
['CVE-2018-7408']
Incorrect Permission Assignment for Critical Resource in NPM
An issue was discovered in an npm 5.7.0 2018-02-21 pre-release (marked as "next: 5.7.0" and therefore automatically installed by an "npm upgrade -g npm" command, and also announced in the vendor's blog without mention of pre-release status). It might allow local users to bypass intended filesystem access restrictions b...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7408'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm/issues/19883'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm/commit/74e149da6efe6ed89477faa81fef08eee7999ad0'}, {'type': 'PACKAGE', 'url': 'github.com/npm/cli'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:53:12Z', 'nvd_published_at': '2018-02-22T18:29:00Z'}
1.4.0
GHSA-cqf7-ff9h-7967
2023-09-05T14:08:03Z
2022-05-17T00:48:30Z
null
['CVE-2015-5145']
Django ReDoS in validators.URLValidator
`validators.URLValidator` in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5145'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/8f9a4d3a2bc42f14bb437defd30c7315adbff22c'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://github.com/django/django/blob/4555a8...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T19:54:38Z', 'nvd_published_at': '2015-07-14T17:59:00Z'}
1.4.0
GHSA-vwq9-cmqr-3c8c
2023-03-06T20:49:07Z
2022-05-24T16:51:50Z
null
['CVE-2019-10343']
Insertion of Sensitive Information into Log File in Jenkins Configuration as Code Plugin
Configuration as Code Plugin logs the changes it applies to the Jenkins system log. Secrets such as passwords should be masked (i.e. replaced with asterisks) in that log to prevent accidental disclosure. Between Configuration as Code Plugin 0.8-alpha and 1.0, log messages contained values if the values were specified ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins:configuration-as-code'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.24'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10343'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/07/31/1'}]
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:08:40Z', 'nvd_published_at': '2019-07-31T13:15:00Z'}
1.4.0
GHSA-vx7m-v8v2-fhwm
2023-09-26T19:13:22Z
2022-05-24T17:00:26Z
null
['CVE-2019-8131']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code into code field of an inventory source.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8131'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:03:39Z', 'nvd_published_at': '2019-11-06T00:15:00Z'}
1.4.0
GHSA-wcrg-92wp-4h28
2022-12-21T18:52:12Z
2022-05-24T17:30:19Z
null
['CVE-2020-2298']
XXE vulnerability in Jenkins Nerrvana Plugin
Nerrvana Plugin 1.02.06 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers with Overall/Read permission to have Jenkins parse a crafted HTTP request with XML data that uses external entities for extraction of secrets from the Jenkins controller or server-s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nerrvana-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.02.06'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2298'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/nerrvana-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2097'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:52:12Z', 'nvd_published_at': '2020-10-08T13:15:00Z'}
1.4.0
GHSA-8h7p-qjv8-9mp4
2022-06-29T19:10:03Z
2022-05-13T01:19:22Z
null
['CVE-2018-17060']
Improper Access Control in Telerik Extensions
Telerik Extensions for ASP.NET MVC (all versions) does not whitelist requests, which can allow a remote attacker to access files inside the server's web directory. NOTE: this product has been obsolete since June 2013.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'TelerikMvcExtensions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2013.1.219'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17060'}, {'type': 'WEB', 'url': 'https://www.telerik.com/support/code-library/security-alert-for-the-obsolete-telerik-extensions-for-asp-net-mvc'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T19:10:03Z', 'nvd_published_at': '2018-10-08T16:29:00Z'}
1.4.0
GHSA-rp4x-h577-chvq
2022-12-15T16:51:41Z
2022-05-24T19:20:32Z
null
['CVE-2021-21699']
Stored XSS vulnerability in Jenkins Active Choices Plugin
Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. Active Choices Plugin 2.5.7 escapes references to parameter name...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.biouno:uno-choice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21699'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/active-choices-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-12/#SECURITY-2219'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T16:51:41Z', 'nvd_published_at': '2021-11-12T11:15:00Z'}
1.4.0
GHSA-r84v-qff8-jv5g
2022-07-20T01:27:19Z
2022-05-24T17:43:20Z
null
['CVE-2021-26700']
Remote code execution in vscode-npm-script
Visual Studio Code npm-script Extension Remote Code Execution Vulnerability
[]
[{'package': {'ecosystem': 'npm', 'name': 'vscode-npm-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26700'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/vscode-npm-scripts'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26700'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:27:19Z', 'nvd_published_at': '2021-02-25T23:15:00Z'}
1.4.0
GHSA-g4jg-gpwv-p7wv
2022-07-13T18:41:58Z
2022-05-17T01:50:09Z
null
['CVE-2011-5245']
Exposure of Sensitive Information to an Unauthorized Actor in RESTEasy
The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy before 2.3.2 allows remote attackers to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a similar vulnerability to CVE-2012-0818.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-5245'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/resteasy/pull/34'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=785631'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/72808'}, {'ty...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:41:58Z', 'nvd_published_at': '2012-11-23T20:55:00Z'}
1.4.0
GHSA-8f2x-hv9r-mh9r
2023-07-18T19:33:47Z
2022-05-24T17:27:21Z
null
['CVE-2020-25102']
silverstripe-advancedreports vulnerable to XSS
silverstripe-advancedreports (aka the Advanced Reports module for SilverStripe) 1.0 through 2.0 is vulnerable to Cross-Site Scripting (XSS) because it is possible to inject and store malicious JavaScript code. The affects `admin/advanced-reports/DataObjectReport/EditForm/field/DataObjectReport/item` (aka report preview...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe-australia/advancedreports'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'last_affected': '2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25102'}, {'type': 'WEB', 'url': 'https://gist.github.com/ahpaleus/c3bd2d41d306544ca3158569335d12f2'}, {'type': 'PACKAGE', 'url': 'https://github.com/nyeholt/silverstripe-advancedreports'}, {'type': 'WEB', 'url': 'https://github.com/nyeholt/silverst...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T19:33:47Z', 'nvd_published_at': '2020-09-03T17:15:00Z'}
1.4.0
GHSA-r674-mc9p-hvw5
2023-08-29T19:02:10Z
2022-05-17T04:54:37Z
null
['CVE-2013-7081']
TYPO3 Improper Access Control vulnerability
The (old) Form Content Element component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 allows remote authenticated editors to generate arbitrary HMAC signatures and bypass intended access restrictions via unspecified vectors.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.31'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_function...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7081'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/473'}, {'type': 'WEB', 'url': 'http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:02:10Z', 'nvd_published_at': '2013-12-23T23:55:00Z'}
1.4.0
GHSA-4c43-cwvx-9crh
2022-07-06T21:05:15Z
2022-05-14T01:10:17Z
null
['CVE-2014-7810']
Improper Access Control in Apache Tomcat
The Expression Language (EL) implementation in Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.58, and 8.x before 8.0.16 does not properly consider the possibility of an accessible interface implemented by an inaccessible class, which allows attackers to bypass a SecurityManager protection mechanism via a web applicati...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.44'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7810'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:05:15Z', 'nvd_published_at': '2015-06-07T23:59:00Z'}
1.4.0
GHSA-g569-49wg-jx5f
2022-11-08T14:18:19Z
2022-05-14T03:37:08Z
null
['CVE-2017-15696']
Apache Geode configuration request authorization vulnerability
When an Apache Geode cluster before v1.4.0 is operating in secure mode, the Geode configuration service does not properly authorize configuration requests. This allows an unprivileged user who gains access to the Geode locator to extract configuration data and previously deployed application code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15696'}, {'type': 'WEB', 'url': 'https://github.com/apache/geode/pull/1059'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/geode'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/GEODE-3962'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:18:19Z', 'nvd_published_at': '2018-02-26T02:29:00Z'}
1.4.0
GHSA-v3c9-w6g2-hjg3
2022-06-08T22:27:22Z
2022-05-24T00:00:18Z
null
['CVE-2022-29002']
Cross-Site Request Forgery in XXL-Job
A Cross-Site Request Forgery (CSRF) in XXL-Job v2.3.0 allows attackers to arbitrarily create administrator accounts via the component /gaia-job-admin/user/add.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29002'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/2821'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:27:22Z', 'nvd_published_at': '2022-05-23T21:16:00Z'}
1.4.0
GHSA-wxcp-f2c8-x6xv
2022-07-06T20:06:08Z
2022-05-13T01:02:15Z
null
['CVE-2016-0762']
Observable Discrepancy in Apache Tomcat
The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default config...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0M1'}, {'fixed': '9.0.0.M10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0762'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2247'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:06:08Z', 'nvd_published_at': '2017-08-10T16:29:00Z'}
1.4.0
GHSA-p783-gj6m-9r88
2023-09-26T19:26:31Z
2022-05-24T17:00:29Z
null
['CVE-2019-8150']
Magento 2 Community Edition RCE Vulnerability
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with privileges to manipulate layouts and images can insert a malicious payload into the page layout.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8150'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:00:48Z', 'nvd_published_at': '2019-11-06T00:15:00Z'}
1.4.0
GHSA-82j9-wfcf-9v2h
2023-08-09T21:04:54Z
2022-05-24T17:07:14Z
null
['CVE-2020-7936']
Plone Open Redirect Vulnerability
An open redirect on the login form (and possibly other places) in Plone 4.0 through 5.2.1 allows an attacker to craft a link to a Plone Site that, when followed, and possibly after login, will redirect to an attacker's site.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.3.20'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7936'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20200121'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20200121/an-open-redirection-on-the-login-form-and...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T23:52:07Z', 'nvd_published_at': '2020-01-23T21:15:00Z'}
1.4.0
GHSA-694v-63fq-fmr4
2022-05-18T19:57:37Z
2022-05-04T00:00:24Z
null
['CVE-2022-1554']
Path Traversal in scout-browser
Scout is a Variant Call Format (VCF) visualization interface. The Pypi package `scout-browser` is vulnerable to path traversal due to `send_file` call in versions prior to 4.52.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'scout-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.52'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1554'}, {'type': 'WEB', 'url': 'https://github.com/Clinical-Genomics/scout/issues/3128'}, {'type': 'WEB', 'url': 'https://github.com/Clinical-Genomics/scout/issues/3302'}, {'type': 'WEB', 'url': 'https://github.com/Clinical-Genomics/scout/pull/3303...
{'cwe_ids': ['CWE-22', 'CWE-36'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-18T19:57:37Z', 'nvd_published_at': '2022-05-03T09:15:00Z'}
1.4.0
GHSA-4c5w-qqfg-grf3
2023-08-01T20:00:06Z
2022-05-13T01:13:58Z
null
['CVE-2015-8766']
Symfony XSS Vulnerabilities
Multiple cross-site scripting (XSS) vulnerabilities in `content/content.systempreferences.php` in Symphony CMS before 2.6.4 allow remote attackers to inject arbitrary web script or HTML via the (1) `email_sendmail[from_name]`, (2) `email_sendmail[from_address]`, (3) `email_smtp[from_name]`, (4) `email_smtp[from_address...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8766'}, {'type': 'WEB', 'url': 'https://github.com/symphonycms/symphony-2/commit/651e150091c61fb60ad1dff2bc2166185a83d9d6'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210321090853/https://cybersecurityworks.com/zerodays/cve-2015-8766-ge...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T20:00:06Z', 'nvd_published_at': '2016-01-08T21:59:00Z'}
1.4.0
GHSA-cqmh-mpx2-g633
2022-07-08T18:56:28Z
2022-05-17T05:49:38Z
null
['CVE-2010-1666']
Improper Restriction of Operations within the Bounds of a Memory Buffer in python-cjson
Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-cjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-1666'}, {'type': 'WEB', 'url': 'https://github.com/AGProjects/python-cjson/commit/dc2b8781b8666de5ca707318521f554904fdd690'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ubuntu/+source/python-cjson/+bug/585274'}, {'type': 'PACKAGE', 'url': '...
{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:56:28Z', 'nvd_published_at': '2010-07-02T19:00:00Z'}
1.4.0
GHSA-xc4g-7vw8-924h
2023-02-14T00:51:28Z
2022-05-17T01:44:00Z
null
['CVE-2012-3447']
Arbitrary file overwrite in OpenStack Nova
virt/disk/api.py in OpenStack Compute (Nova) 2012.1.x before 2012.1.2 and Folsom before Folsom-3 allows remote authenticated users to overwrite arbitrary files via a symlink attack on a file in an image that uses a symlink that is only readable by root. NOTE: this vulnerability exists because of an incomplete fix for ...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3447'}, {'type': 'WEB', 'url': 'https://github.com/openstack/nova/commit/ce4b2e27be45a85b310237615c47eb53f37bb5f3'}, {'type': 'WEB', 'url': 'https://github.com/openstack/nova/commit/d9577ce9f266166a297488445b5b0c93c1ddb368'}, {'type': 'WEB', 'url':...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:51:28Z', 'nvd_published_at': '2012-08-20T18:55:00Z'}
1.4.0
GHSA-qwgm-mxm4-3q2c
2023-01-24T16:02:54Z
2022-05-24T22:01:17Z
null
['CVE-2014-0083']
net-ldap has weak salt when generating passwords
The Ruby net-ldap gem before 0.16.2 uses a weak salt when generating SSHA passwords.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'net-ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0083'}, {'type': 'WEB', 'url': 'https://github.com/ruby-ldap/ruby-net-ldap/commit/b412ca05f6b430eaa1ce97ac95885b4cf187b04a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0083'}, {'type': 'WEB', 'url': 'https://bugzi...
{'cwe_ids': ['CWE-916'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T16:02:54Z', 'nvd_published_at': '2019-11-21T14:15:00Z'}
1.4.0
GHSA-mm32-jw73-9227
2023-08-29T18:25:11Z
2022-05-17T04:49:45Z
null
['CVE-2013-4194']
Plone is vulnerable to File System Path Exposure
The WYSIWYG component (wysiwyg.py) in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote attackers to obtain sensitive information via a crafted URL, which reveals the installation path in an error message.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'e...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4194'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978470'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:25:11Z', 'nvd_published_at': '2014-03-11T19:37:00Z'}
1.4.0
GHSA-f88q-22g8-frcg
2023-07-21T22:30:25Z
2022-05-13T01:48:35Z
null
['CVE-2018-1000226']
Cobbler Improper Validation of Security Tokens
Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API (/cobbler_api) that can result in Privilege escalation, data manipulation or exfiltration, LDAP ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000226'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/issues/1916'}, {'type': 'WEB', 'url': 'https://movermeyer.com/2018-08-02-privilege-escalation-exploits-in-cobblers-api/'}]
{'cwe_ids': ['CWE-732'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:30:25Z', 'nvd_published_at': '2018-08-20T20:29:00Z'}
1.4.0
GHSA-4262-wr7p-gpcj
2022-11-22T18:46:01Z
2022-05-13T01:06:55Z
null
['CVE-2019-6804']
Rundeck Community Edition vulnerable to Cross-site Scripting
An XSS issue was discovered on the Job Edit page in Rundeck Community Edition before 3.0.13, related to assets/javascripts/workflowStepEditorKO.js and views/execution/_wfitemEdit.gsp.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6804'}, {'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/issues/4406'}, {'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/commit/e992e94bba22d9fca3a669f0d02c85b80a19f848'}, {'type': 'WEB', 'url': 'https://docs.rundeck.com/docs/hi...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:46:01Z', 'nvd_published_at': '2019-01-25T05:29:00Z'}
1.4.0
GHSA-x74x-qf5j-35jh
2022-06-01T19:41:15Z
2022-05-13T01:15:09Z
null
['CVE-2019-1003041']
Sandbox bypass vulnerability in Jenkins Pipeline: Groovy Plugin
A sandbox bypass vulnerability in Jenkins Pipeline: Groovy Plugin 2.64 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.65'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003041'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1423'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/workflow-cps-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-03-25/#SECURITY-...
{'cwe_ids': ['CWE-470'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:41:15Z', 'nvd_published_at': '2019-03-28T18:29:00Z'}
1.4.0
GHSA-wf9g-rh76-6jvr
2022-07-01T17:37:13Z
2022-05-13T01:36:54Z
null
['CVE-2017-2612']
Incorrect Permission Assignment for Critical Resource in Jenkins
In Jenkins before versions 2.44, 2.32.2 low privilege users were able to override JDK download credentials (SECURITY-392), resulting in future builds possibly failing to download a JDK.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.34'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2612'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/a814154695e23dc37542af7d40cacc129cf70722'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2612'}, {'type': 'PACKAGE', 'url': 'https://github....
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:37:13Z', 'nvd_published_at': '2018-05-15T20:29:00Z'}
1.4.0
GHSA-q74x-qqhr-f8rx
2023-09-22T23:13:03Z
2022-05-01T23:37:49Z
null
['CVE-2008-1232']
Apache Tomcat Cross-site scripting (XSS) vulnerability
Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.38'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.37'}}, {'package': {'ecosystem': 'M...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-1232'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2008:0648'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2008:0862'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2008:0864'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T23:13:03Z', 'nvd_published_at': '2008-08-04T01:41:00Z'}
1.4.0
GHSA-hj36-v72x-cc6j
2022-12-20T22:37:18Z
2022-05-24T17:27:06Z
null
['CVE-2020-2242']
Missing permission checks in Jenkins Database Plugin
A missing permission check in Jenkins database Plugin 1.6 and earlier allows attackers with Overall/Read access to Jenkins to connect to an attacker-specified database server using attacker-specified credentials. Database Plugin 1.7 requires Overall/Administer permission for the affected form validation method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2242'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/database-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1024'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:37:18Z', 'nvd_published_at': '2020-09-01T14:15:00Z'}
1.4.0
GHSA-6r6h-vhg7-53x7
2023-07-06T21:21:16Z
2022-05-24T17:47:31Z
null
['CVE-2020-28124']
Cross Site Scripting (XSS) in LavaLite 5.8.0
Cross Site Scripting (XSS) in LavaLite 5.8.0 via the Address field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.8.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28124'}, {'type': 'WEB', 'url': 'https://github.com/418sec/cms/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/pull/339'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/pull/339/commits/fe5e71c34d37a601e6208f671e34f04b56...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:21:16Z', 'nvd_published_at': '2021-04-14T18:15:00Z'}
1.4.0
GHSA-vx6r-w45x-q3h6
2022-12-06T21:39:24Z
2022-05-24T16:59:37Z
null
['CVE-2019-10468']
Jenkins Kubernetes CI/CD Plugin vulnerable to Cross-Site Request Forgery
A cross-site request forgery vulnerability in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. ## Note: Jenkins has suspended distribution of th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.elasticbox.jenkins-ci.plugins:kubernetes-ci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10468'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-ci-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/kubernetes-...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:39:24Z', 'nvd_published_at': '2019-10-23T13:15:00Z'}
1.4.0
GHSA-vjcm-j85r-7p68
2023-08-11T18:38:31Z
2022-05-24T17:09:34Z
null
['CVE-2020-5188']
DNN File Upload Vulnerability
DNN (formerly DotNetNuke) through 9.4.4 has a File upload vulnerability via bypassing client-side file extension check
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5188'}, {'type': 'PACKAGE', 'url': 'https://github.com/dnnsoftware/Dnn.Platform'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/releases'}, {'type': 'WEB', 'url': 'https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-s...
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T21:30:08Z', 'nvd_published_at': '2020-02-24T15:15:00Z'}
1.4.0
GHSA-38x2-fp9m-87mx
2022-07-07T23:07:00Z
2022-05-13T01:09:20Z
null
['CVE-2014-0034']
Improper Input Validation in Apache CXF
The SecurityTokenService (STS) in Apache CXF before 2.6.12 and 2.7.x before 2.7.9 does not properly validate SAML tokens when caching is enabled, which allows remote attackers to gain access via an invalid SAML token.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-ws-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-ws-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0034'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc7...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:07:00Z', 'nvd_published_at': '2014-07-07T14:55:00Z'}
1.4.0
GHSA-w7rq-8f2g-jvqr
2023-08-16T22:22:45Z
2022-05-17T03:50:02Z
null
['CVE-2014-3994']
Djiblets Cross-site scripting Vulnerability via JSON Objects
A cross-site scripting (XSS) vulnerability in `util/templatetags/djblets_js.py` in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Djblets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.30'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Djblets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3994'}, {'type': 'WEB', 'url': 'https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd'}, {'type': 'WEB', 'url': 'https://github.com/djblets/djblets/commit/77a68c03cd619a0996f3f37337b8c39ca6643d6e'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:22:45Z', 'nvd_published_at': '2014-06-16T18:55:00Z'}
1.4.0
GHSA-89hj-xfx5-7q66
2023-09-05T13:57:57Z
2022-05-17T03:07:04Z
null
['CVE-2014-0473']
Django Reuses Cached CSRF Token
The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0473'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2014/apr/21/security/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html'}...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:56:38Z', 'nvd_published_at': '2014-04-23T15:55:00Z'}
1.4.0
GHSA-v5c9-mmw9-829q
2022-06-17T21:23:30Z
2022-05-14T02:39:43Z
null
['CVE-2008-5619']
PHPMailer susceptible to arbitrary code execution
html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer before 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-5619'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/commit/8beacc646acb67c995aea10ac5585970efc7355a'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPMailer/PHPMailer/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/expl...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:23:30Z', 'nvd_published_at': '2008-12-17T02:30:00Z'}
1.4.0
GHSA-633w-w2pf-x84r
2022-11-22T18:57:07Z
2022-05-14T02:46:33Z
null
['CVE-2016-3089']
Apache OpenMeetings Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in the SWF panel in Apache OpenMeetings before 3.1.2 allows remote attackers to inject arbitrary web script or HTML via the swf parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3089'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'https://www.apache.org/dist/openmeetings/3.1.2/CHANGELOG'}, {'type': 'WEB', 'url': 'http://openmeetings.apache.org/security.html'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:07Z', 'nvd_published_at': '2016-08-19T21:59:00Z'}
1.4.0
GHSA-mqwr-4qf2-2hcv
2023-03-09T00:39:36Z
2022-05-13T01:38:26Z
null
['CVE-2017-0903']
RubyGems vulnerable to Deserialization of Untrusted Data
RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution. The issue has been patched in 2.6.14.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0903'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bab49'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/274990'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-20...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T00:39:36Z', 'nvd_published_at': '2017-10-11T18:29:00Z'}
1.4.0
GHSA-hxvp-655x-xxqv
2023-08-29T10:35:27Z
2022-05-17T04:44:31Z
null
['CVE-2014-0135']
Kafo allows local users to obtain passwords and other sensitive information by reading default_values.yaml
Kafo before 0.3.17 and 0.4.x before 0.5.2, as used by Foreman, uses world-readable permissions for `default_values.yaml`, which allows local users to obtain passwords and other sensitive information by reading the file.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'kafo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'kafo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0135'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/kafo/CVE-2014-0135.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/theforeman/kafo'}, {'type': 'WEB', 'url': 'http://theforeman.org/security.html'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:09:10Z', 'nvd_published_at': '2014-05-08T14:29:00Z'}
1.4.0
GHSA-fxrx-5j36-pwg5
2023-08-01T23:30:55Z
2022-05-24T22:00:06Z
null
['CVE-2019-1051']
ChakraCore RCE via Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-20...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1051'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/846e508ea0862846e89ef41e87ecfb73a75ac130'}, {'type...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:30:55Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}
1.4.0
GHSA-jphj-5g3m-w7x6
2022-11-22T19:22:31Z
2022-05-14T00:57:52Z
null
['CVE-2018-11688']
Ignite Realtime Openfire vulnerable to cross-site scripting
Ignite Realtime Openfire before 3.9.2 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability via a crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11688'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/commit/ed3492a24274fd454afe93a499db49f3d6335108#diff-3f607cf668ad8f1091e789a2c1dca32a'}, {'type': 'PACKAGE', 'url': 'https://github.com/igniterealtime/Openfire'}, {'type': ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:22:31Z', 'nvd_published_at': '2018-06-13T16:29:00Z'}
1.4.0
GHSA-5qp6-78pr-gv8c
2023-08-29T18:03:31Z
2022-05-17T03:46:28Z
null
['CVE-2013-4701']
PHP OpenID Library Denial of Service vulnerability
Auth/Yadis/XML.php in PHP OpenID Library 2.2.2 and earlier allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via XRDS data containing an external entity declaration in conjunction with an entity reference, related to an XML...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'openid/php-openid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4701'}, {'type': 'WEB', 'url': 'https://github.com/openid/php-openid/commit/625c16bb28bb120d262b3f19f89c2c06cb9b0da9'}, {'type': 'PACKAGE', 'url': 'https://github.com/openid/php-openid'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN24713981/inde...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:03:31Z', 'nvd_published_at': '2013-08-21T16:55:00Z'}
1.4.0
GHSA-v6q8-8wgx-8hm7
2023-09-28T20:45:04Z
2022-05-14T01:38:22Z
null
['CVE-2019-7171']
Croogo vulnerable to XSS in title field
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/blocks/blocks/edit/8.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7171'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/issues/887'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/commit/cafaaabe2cef3d1d83652370e30563e6ad7c4158'}, {'type': 'PACKAGE', 'url': 'https://github.com/croogo/croogo'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:24:09Z', 'nvd_published_at': '2019-01-29T18:29:00Z'}
1.4.0
GHSA-r69c-5j7c-vm6q
2022-07-01T18:00:19Z
2022-05-13T01:02:35Z
null
['CVE-2017-2601']
Cross-site Scripting in Jenkins
Jenkins before versions 2.44 and 2.32.2 is vulnerable to a persisted cross-site scripting in parameter names and descriptions (SECURITY-353). Users with the permission to configure jobs were able to inject JavaScript into parameter names and descriptions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.32.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2601'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/fd2e081b947124c90bcd97bfc55e1a7f2ef41a74'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2601'}, {'type': 'PACKAGE', 'url': 'https://github....
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T18:00:19Z', 'nvd_published_at': '2018-05-10T13:29:00Z'}
1.4.0
GHSA-rm7r-xv53-xwc3
2022-12-22T13:41:28Z
2022-05-24T17:33:08Z
null
['CVE-2020-2314']
Password stored in plain text by Jenkins AppSpider Plugin
AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file `com.rapid7.jenkinspider.PostBuildScan.xml` on the Jenkins controller as part of its configuration. This password can be viewed by users with access to the Jenkins controller file system. AppSpider Plugin 1.0.13 stores ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.rapid7:jenkinsci-appspider-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2314'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/appspider-build-scanner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2058'}]
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:41:28Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-jvxx-8xxf-5495
2023-07-31T21:44:50Z
2022-05-17T02:36:23Z
null
['CVE-2016-9866']
phpMyAdmin CSRF Vulnerability
An issue was discovered in phpMyAdmin. When the arg_separator is different from its default & value, the CSRF token was not properly stripped from the return URL of the preference import action. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4'}, {'fixed': '4.4....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9866'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123194736/http://www.securityfocus.com/bid/94536'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/P...
{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:44:50Z', 'nvd_published_at': '2016-12-11T03:00:00Z'}
1.4.0
GHSA-cf46-6xxh-pc75
2023-03-08T19:57:56Z
2022-05-24T16:49:07Z
null
['CVE-2019-13118']
libxslt Type Confusion vulnerability that affects Nokogiri
In `numbers.c` in libxslt 1.1.33, a type holding grouping characters of an `xsl:number` instruction was too narrow and an invalid character/length combination could be passed to `xsltNumberFormatDecimal`, leading to a read of uninitialized stack data. Nokogiri prior to version 1.10.5 used a vulnerable version of libxs...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13118'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1943'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/43a175339b47b8c604508813fc75b83f13cd173e'}, {'type': 'WEB', 'url': 'https://bugs.chro...
{'cwe_ids': ['CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T19:57:56Z', 'nvd_published_at': '2019-07-01T02:15:00Z'}
1.4.0
GHSA-vcr8-h8qp-qj8h
2022-06-28T22:29:22Z
2022-05-24T16:55:01Z
null
['CVE-2019-10384']
Cross-Site Request Forgery in Jenkins
Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.176.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.176.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10384'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2789'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3144'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1491'},...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:29:22Z', 'nvd_published_at': '2019-08-28T16:15:00Z'}
1.4.0
GHSA-5f5r-65pm-r3wr
2023-07-27T19:49:30Z
2022-05-17T00:11:58Z
null
['CVE-2017-11916']
ChakraCore RCE Vulnerability
ChakraCore allows an attacker to execute arbitrary code in the context of the current user, due to how the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11916'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4411'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/69e03c35543d2bf3befce6885d78cd751bf5db10'}, {'type': 'WEB', 'url': 'https://portal.msrc...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:49:30Z', 'nvd_published_at': '2017-12-12T21:29:00Z'}
1.4.0
GHSA-r4mw-gxf7-vxr9
2022-07-28T22:08:12Z
2022-05-24T17:06:16Z
null
['CVE-2020-0606']
Remote code execution in Microsoft.WindowsDesktop.App.Ref
A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Framework Remote Code Execution Vulnerability'. This CVE ID is unique...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Ref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.1'}, {'fixed': '3.0.2'}]}], 'versions': ['3.0.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Ref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0606'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/149'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidanc...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-28T22:08:12Z', 'nvd_published_at': '2020-01-14T23:15:00Z'}
1.4.0
GHSA-r6fx-55x3-f9x6
2023-09-12T13:30:02Z
2022-05-17T00:00:34Z
null
['CVE-2021-23267']
Crafter CMS Crafter Studio vulnerable to Improper Control of Dynamically-Managed Code Resources
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker static methods.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23267'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2022051603'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftercms/studio'}]
{'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T13:44:50Z', 'nvd_published_at': '2022-05-16T17:15:00Z'}
1.4.0
GHSA-4wx5-c723-xvwv
2022-12-16T23:00:33Z
2022-05-24T17:15:35Z
null
['CVE-2020-2177']
Credentials stored in plain text by Jenkins Copr Plugin
Copr Plugin 0.3 and earlier stores credentials unencrypted in job `config.xml` files as part of its configuration. These credentials can be viewed by users with Extended Read permission or access to the Jenkins controller file system. Copr Plugin 0.6.1 stores these credentials encrypted. This change is effective once ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.fedoraproject.jenkins.plugins:copr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2177'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/copr-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-04-16/#SECURITY-1556'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/04/16/...
{'cwe_ids': ['CWE-256', 'CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T23:00:33Z', 'nvd_published_at': '2020-04-16T19:15:00Z'}
1.4.0
GHSA-66vj-393f-hxfv
2023-02-08T19:57:23Z
2022-05-17T04:04:46Z
null
['CVE-2014-3497']
OpenStack Swift Cross-site Scriping vulnerability
Cross-site scripting (XSS) vulnerability in OpenStack Swift 1.11.0 through 1.13.1 allows remote attackers to inject arbitrary web script or HTML via the WWW-Authenticate header.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.13.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3497'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0941'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-3497'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1110809'}, {'type...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T19:57:23Z', 'nvd_published_at': '2014-07-03T17:55:00Z'}
1.4.0
GHSA-49j7-qghp-5wj8
2022-07-08T19:07:06Z
2022-05-17T04:17:07Z
null
['CVE-2013-2035']
Improper Control of Generation of Code in HawtJNI
Race condition in hawtjni-runtime/src/main/java/org/fusesource/hawtjni/runtime/Library.java in HawtJNI before 1.8, when a custom library path is not specified, allows local users to execute arbitrary Java code by overwriting a temporary JAR file with a predictable name in /tmp.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.fusesource.hawtjni:hawtjni-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2035'}, {'type': 'WEB', 'url': 'https://github.com/jline/jline2/issues/85'}, {'type': 'WEB', 'url': 'https://github.com/jruby/jruby/issues/732'}, {'type': 'WEB', 'url': 'https://github.com/fusesource/hawtjni/commit/92c266170ce98edc200c656bd034a2370...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:07:06Z', 'nvd_published_at': '2013-08-28T23:55:00Z'}
1.4.0
GHSA-9986-w5h5-vw59
2023-08-03T17:32:50Z
2022-05-02T03:26:04Z
null
['CVE-2009-1523']
Directory traversal in Mort Bay Jetty
Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 5.1.14, 6.x before 6.1.17, and 7.x through 7.0.0.M2 allows remote attackers to access arbitrary files via directory traversal sequences in the URI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0.M0'}, {'fixed': '7.0....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-1523'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=499867'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01257.html'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T17:32:50Z', 'nvd_published_at': '2009-05-05T17:30:00Z'}
1.4.0
GHSA-fg52-xjfc-9rh8
2022-12-16T14:34:49Z
2022-05-24T16:51:37Z
null
['CVE-2019-1020002']
Pterodactyl vulnerable to 2FA Sniffing
**Pterodactyl version 0.7.13 and lower - 2FA Sniffing** Users who have enabled 2FA protections on their account can unintentionally have their account's existence sniffed by malicious users who enter random credentials into the login fields. ### Impact Users who have enabled 2FA protections on their account can unint...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.13'}}]
[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-vcm9-hx3q-qwj8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020002'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/commit/092e7e79fff858ee026608c7dbccab165a67526f'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T14:34:49Z', 'nvd_published_at': '2019-07-29T15:15:00Z'}
1.4.0
GHSA-xf9f-32gh-h2w4
2022-07-13T14:04:46Z
2022-05-13T01:09:21Z
null
['CVE-2012-5633']
Improper Authentication in Apache CXF
The URIMappingInterceptor in Apache CXF before 2.5.8, 2.6.x before 2.6.5, and 2.7.x before 2.7.2, when using the WSS4JInInterceptor, bypasses WS-Security processing, which allows remote attackers to obtain access to SOAP services via an HTTP GET request.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.5'}]}]}, {'pac...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5633'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/81980'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CXF-4629'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/JBWS-3575'}, {'type': 'W...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T14:04:46Z', 'nvd_published_at': '2013-03-12T23:55:00Z'}
1.4.0
GHSA-q58j-fhj7-j6fg
2022-12-16T22:58:21Z
2022-05-24T19:19:43Z
null
['CVE-2021-21698']
Path traversal vulnerability in Jenkins Subversion Plugin allows reading arbitrary files
Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent. This allows attackers able to control agent processes to read arbitrary files on the Jenkins controller file system. Subversion Plugin 2.15.1 checks for the presence of and ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.15.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21698'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2506'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T22:58:21Z', 'nvd_published_at': '2021-11-04T17:15:00Z'}
1.4.0
GHSA-m7r6-43v2-49vf
2023-09-21T23:19:53Z
2022-05-01T18:44:39Z
null
['CVE-2007-6612']
Mongrel vulnerable to directory traversal via double-encoded sequences
Directory traversal vulnerability in DirHandler (lib/mongrel/handlers.rb) in Mongrel 1.0.4 (1.0.3 and prior are not affected) and 1.1.x before 1.1.3 allows remote attackers to read arbitrary files via an HTTP request containing double-encoded sequences (`.%252e`).
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'mongrel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.4'}, {'fixed': '1.0.5'}]}], 'versions': ['1.0.4']}, {'package': {'ecosystem': 'RubyGems', 'name': 'mongrel'}, 'ecosystem_specific': {'affected_fu...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6612'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongrel/mongrel'}, {'type': 'WEB', 'url': 'https://lists.apple.com/archives/security-announce/2008//May/msg00001.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080111034049/http:...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T23:19:53Z', 'nvd_published_at': '2008-01-03T22:46:00Z'}
1.4.0
GHSA-f866-m9mv-2xr3
2022-07-20T17:04:59Z
2022-05-14T02:54:56Z
null
['CVE-2011-2894']
Spring Framework and Spring Security vulnerable to Deserialization of Untrusted Data
Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and u...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2894'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/69687'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120307233721/http://www.springsource.com/security/cve-2011-2894'}, {'type': 'WEB', 'url': 'http://os...
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:57:50Z', 'nvd_published_at': '2011-10-04T10:55:00Z'}
1.4.0
GHSA-mq4x-8whh-jx73
2022-06-08T22:32:53Z
2022-05-01T07:02:10Z
null
['CVE-2006-2759']
Improper Input Validation in Mortbay Jetty
jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary script source code via a capital P in the .jsp extension, and probably other mixed case manipulations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-2759'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://www.eclipse.org/jetty/about.php'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:32:53Z', 'nvd_published_at': '2006-06-02T01:02:00Z'}
1.4.0
GHSA-ccmr-qj26-845g
2022-06-28T23:22:46Z
2022-05-13T01:34:04Z
null
['CVE-2018-17247']
Improper Restriction of XML External Entity Reference in Elasticsearch
Elasticsearch Security versions 6.5.0 and 6.5.1 contain an XXE flaw in Machine Learning's find_file_structure API. If a policy allowing external network access has been added to Elasticsearch's Java Security Manager then an attacker could send a specially crafted request capable of leaking content of local files on the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.5.0'}, {'fixed': '6.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17247'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-6-5-2-security-update/159594'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106294'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:22:46Z', 'nvd_published_at': '2018-12-20T22:29:00Z'}
1.4.0
GHSA-8vh5-j6xj-5953
2023-07-22T00:07:35Z
2022-05-14T00:55:27Z
null
['CVE-2018-19311']
Centreon XSS Vulnerability
Centreon 3.4.x (fixed in Centreon 18.10.0) allows XSS via the Service field to the `main.php?p=20201` URI, as demonstrated by the "Monitoring > Status Details > Services" screen.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '18.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19311'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6632'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-22T00:07:35Z', 'nvd_published_at': '2018-11-16T19:29:00Z'}
1.4.0
GHSA-hx44-c87v-p6xg
2022-11-08T21:57:59Z
2022-05-13T01:40:59Z
null
['CVE-2017-1000221']
Opencast has Incorrect Permission Assignment
In Opencast 2.2.3 and older if user names overlap, the Opencast search service used for publication to the media modules and players will handle the access control incorrectly so that users only need to match part of the user name used for the access restriction. For example, a user with the role ROLE_USER will have ac...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000221'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/f1abcaf998a469a2081461e0e3b4211927849439'}, {'type': 'WEB', 'url': 'https://opencast.jira.com/browse/MH-11862'}]
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T21:57:59Z', 'nvd_published_at': '2017-11-17T22:29:00Z'}
1.4.0
GHSA-qx3p-9mmp-4v8h
2023-08-23T13:48:00Z
2022-05-24T17:35:40Z
null
['CVE-2020-27822']
Wildfly has a memory leak vulnerability
A flaw was found in Wildfly affecting versions 19.0.0.Final, 19.1.0.Final, 20.0.0.Final, 20.0.1.Final, and 21.0.0.Final. When an application uses the OpenTracing API's java-interceptors, there is a possibility of a memory leak. This flaw allows an attacker to impact the availability of the server. The highest threat fr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0.Final'}, {'fixed': '21.0.2.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-parent'}, 'ecosystem_s...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27822'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly/pull/13749'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly/pull/13779'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly/commit/67ef84fd7aab789a535b137e5e5...
{'cwe_ids': ['CWE-401'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T22:38:36Z', 'nvd_published_at': '2020-12-08T01:15:00Z'}
1.4.0
GHSA-h8pc-j334-jjhm
2022-05-25T19:44:25Z
2022-05-19T00:00:30Z
null
['CVE-2022-1432']
Cross-site Scripting in OctoPrint
Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0. The Stream URL of octoprint application allowing a xss payload to execute.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'octoprint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1432'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/6d259d7e6f5b0de9a1c762831537a386e53978d3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h8pc-j334-jjhm'}, {'type': 'PACKAGE', 'url': 'https://github.c...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:44:25Z', 'nvd_published_at': '2022-05-18T14:15:00Z'}
1.4.0
GHSA-pjch-4g28-fxx7
2022-05-24T20:58:43Z
2022-05-07T00:00:31Z
null
['CVE-2021-23792']
External Entity Reference in TwelveMonkeys ImageIO
The package com.twelvemonkeys.imageio:imageio-metadata before version 3.7.1 is vulnerable to XML External Entity (XXE) Injection due to an insecurely initialized XML parser for reading XMP Metadata. An attacker can exploit this vulnerability if they are able to supply a file (e.g. when an online profile picture is proc...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.twelvemonkeys.imageio:imageio-metadata'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23792'}, {'type': 'WEB', 'url': 'https://github.com/haraldk/TwelveMonkeys/commit/da4efe98bf09e1cce91b7633cb251958a200fc80'}, {'type': 'PACKAGE', 'url': 'https://github.com/haraldk/TwelveMonkeys'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-J...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T20:58:43Z', 'nvd_published_at': '2022-05-06T20:15:00Z'}
1.4.0
GHSA-w47g-4vrc-m3w2
2022-11-03T18:45:55Z
2022-05-24T16:44:43Z
null
['CVE-2019-0186']
Cross-site Scripting in Apache Pluto Chatroom demo
The input fields of the Apache Pluto "Chat Room" demo portlet 3.0.0 and 3.0.1 are vulnerable to Cross-Site Scripting (XSS) attacks. Mitigation: * Uninstall the ChatRoomDemo war file - or - * migrate to version 3.1.0 of the chat-room-demo war file
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.pluto:chatRoomDemo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0186'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d093e6b0e5f9b3b50928255451afefd8f8fbdcd5bf28a726769a919a@%3Cpluto-user.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://portals.apache.org/pluto/security.html'}, {'type': ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:45:55Z', 'nvd_published_at': '2019-04-26T16:29:00Z'}
1.4.0
GHSA-6cpj-3g83-q2j4
2022-07-12T21:32:13Z
2022-05-17T04:50:16Z
null
['CVE-2012-6612']
Improper Restriction of XML External Entity Reference in Apache Solr
The (1) UpdateRequestHandler for XSLT or (2) XPathEntityProcessor in Apache Solr before 4.1 allows remote attackers to have an unspecified impact via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, different vectors than CVE-2013...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6612'}, {'type': 'WEB', 'url': 'https://github.com/apache/lucene-solr/commit/0d21b900975b7048d2e925d852aeacb9bdc6766c'}, {'type': 'WEB', 'url': 'https://github.com/apache/lucene-solr/commit/f230486ce6707762c1a6e81655d0fac52887906d'}, {'type': 'PACK...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:32:13Z', 'nvd_published_at': '2013-12-07T21:55:00Z'}
1.4.0
GHSA-vrwc-qjmw-5rjm
2022-11-03T22:54:35Z
2022-05-14T00:54:15Z
null
['CVE-2014-0094']
ClassLoader manipulation in Apache Struts
The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to "manipulate" the ClassLoader via the class parameter, which is passed to the getClass method.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.16.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0094'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN19294237/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045'}, {'type': 'WEB', 'url': 'http://pack...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:54:35Z', 'nvd_published_at': '2014-03-11T13:00:00Z'}
1.4.0
GHSA-8884-xcr4-r68p
2022-11-01T21:39:24Z
2022-05-17T00:19:03Z
null
['CVE-2017-8585']
Improper Input Validation in Microsoft.NETCore.App
Microsoft .NET Framework 4.6, 4.6.1, 4.6.2, and 4.7 allow an attacker to send specially crafted requests to a .NET web application, resulting in denial of service, aka .NET Denial of Service Vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.7'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8585'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/corefx/issues/24703'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3248'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/C...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:39:24Z', 'nvd_published_at': '2017-07-11T21:29:00Z'}
1.4.0
GHSA-mhq6-h9m7-wq8c
2023-02-23T21:51:56Z
2022-05-24T16:56:46Z
null
['CVE-2019-10420']
Jenkins Assembla Plugin has Insufficiently Protected Credentials
Assembla Plugin stores the Assembla password unencrypted in its global configuration file `jenkins.plugin.assembla.AssemblaProjectProperty.xml` on the Jenkins controller. This password can be viewed by users with access to the Jenkins controller file system. As of publication of this advisory, there is no fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:assembla'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10420'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1543'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}]
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T21:51:56Z', 'nvd_published_at': '2019-09-25T16:15:00Z'}
1.4.0
GHSA-5hqc-x78w-3cmw
2022-06-07T14:47:39Z
2022-05-26T00:01:31Z
null
['CVE-2022-29405']
Missing Authorization in Apache Archiva
In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29405'}, {'type': 'WEB', 'url': 'https://archiva.apache.org/docs/2.2.8/release-notes.html'}]
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:26:54Z', 'nvd_published_at': '2022-05-25T08:15:00Z'}
1.4.0
GHSA-pw34-qf6c-84fc
2023-07-28T20:49:36Z
2022-05-14T02:08:30Z
null
['CVE-2016-2040']
phpMyAdmin XSS Vulnerability
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.13, 4.4.x before 4.4.15.3, and 4.5.x before 4.5.4 allow remote authenticated users to inject arbitrary web script or HTML via a (1) table name, (2) SET value, (3) search query, or (4) hostname in a Location header.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.10.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'af...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2040'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/75a55824012406a08c4debf5ddb7ae41c32a7dbc'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/aca42efa01917cc0fe8cfdb2927a6399ca1742f2'}, {'type':...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:49:36Z', 'nvd_published_at': '2016-02-20T01:59:00Z'}
1.4.0
GHSA-m833-87vf-576c
2023-08-18T21:25:10Z
2022-05-13T01:37:34Z
2023-08-18T21:25:10Z
['CVE-2017-15113']
ovirt-engine Logs Plaintext Passwords To File
ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.ovirt.engine.sdk:ovirt-engine-sdk-java'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.7.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15113'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2017:3138'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113'}, {'type': 'WEB', 'url': 'https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git;a=c...
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T22:33:08Z', 'nvd_published_at': '2018-07-27T16:29:00Z'}
1.4.0
GHSA-v558-fhw2-v46w
2022-08-30T18:21:15Z
2022-05-24T22:00:03Z
null
['CVE-2019-10328']
Unsafe entry in Script Security list of approved signatures in Pipeline Remote Loader Plugin
Jenkins Pipeline Remote Loader Plugin before 1.5 provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:workflow-remote-loader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10328'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/workflow-remote-loader-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-05-31/#SECURITY-921'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se...
{'cwe_ids': ['CWE-183', 'CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T18:21:15Z', 'nvd_published_at': '2019-05-31T15:29:00Z'}
1.4.0
GHSA-mm5c-7mpr-99fm
2022-12-14T16:22:34Z
2022-05-24T17:44:48Z
null
['CVE-2021-21627']
CSRF vulnerability in Jenkins Libvirt Agents Plugin
Libvirt Agents Plugin 1.9.0 and earlier does not require POST requests for a form submission endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to stop hypervisor domains. Libvirt Agents Plugin 1.9.1 requires POST requests for the affected HTTP endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:libvirt-slave'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21627'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/libvirt-slave-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-1764'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T16:22:34Z', 'nvd_published_at': '2021-03-18T14:15:00Z'}
1.4.0
GHSA-h9wf-mpvf-9jqg
2023-07-20T18:22:17Z
2022-05-13T01:18:32Z
null
['CVE-2018-0837']
ChakraCore RCE Vulnerability
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0837'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/043257b7d47afab1240f5dd4cdd10bde38c574c3'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0837'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:22:17Z', 'nvd_published_at': '2018-02-15T02:29:00Z'}
1.4.0
GHSA-rhqj-4pp8-vvgf
2022-06-30T18:22:46Z
2022-05-14T01:27:09Z
null
['CVE-2018-1000130']
Injection in Jolokia agent
A JNDI Injection vulnerability exists in Jolokia agent version 1.3.7 in the proxy mode that allows a remote attacker to run arbitrary Java code on the server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jolokia:jolokia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.7'}, {'fixed': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000130'}, {'type': 'WEB', 'url': 'https://github.com/rhuss/jolokia/commit/1b360b8889f0ed51165a8d1ac55dd8e0aa2dfd4a'}, {'type': 'WEB', 'url': 'https://github.com/rhuss/jolokia/commit/fd7b93da30c61a45bac10d8b311f1b79a74910f5'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T18:22:46Z', 'nvd_published_at': '2018-03-14T13:29:00Z'}
1.4.0
GHSA-8477-3v39-ggpm
2022-06-28T23:51:50Z
2022-05-13T01:01:01Z
null
['CVE-2018-5382']
Improper Validation of Integrity Check Value in Bouncy Castle
The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where pe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15on'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.50'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5382'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://www.bouncycastle.org/releasenotes.html'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/306792'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-354'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:51:50Z', 'nvd_published_at': '2018-04-16T14:29:00Z'}
1.4.0
GHSA-j6p9-hm3q-hwmj
2022-12-29T01:44:43Z
2022-05-24T17:28:26Z
null
['CVE-2020-2268']
CSRF vulnerability in MongoDB Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins MongoDB Plugin 1.3 and earlier allows attackers to gain access to some metadata of any arbitrary files on the Jenkins controller.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2268'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/mongodb-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1904'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:44:43Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-g32q-4fhf-cq72
2023-07-19T23:44:40Z
2022-05-24T16:45:12Z
null
['CVE-2018-13983']
ImpressCMS XSS
ImpressCMS 1.3.10 has XSS via the PATH_INFO to `htdocs/install/index.php`, `htdocs/install/page_langselect.php`, or `htdocs/install/page_modcheck.php`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13983'}, {'type': 'WEB', 'url': 'https://www.netsparker.com/web-applications-advisories/ns-18-033-cross-site-scripting-in-impresscms/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/150990/ImpressCMS-1.3.10-Cross-Site-Scripting.html...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T23:44:40Z', 'nvd_published_at': '2019-05-06T19:29:00Z'}
1.4.0
GHSA-qmh2-h7r6-gm6q
2022-07-13T21:25:16Z
2022-05-17T02:54:07Z
null
['CVE-2012-3376']
Client BlockTokens not checked in Apache Hadoop
DataNodes in Apache Hadoop 2.0.0 alpha does not check the BlockTokens of clients when Kerberos is enabled and the DataNode has checked out the same BlockPool twice from a NodeName, which might allow remote clients to read arbitrary blocks, write to blocks to which they only have read access, and have other unspecified ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha'}, {'fixed': '2.0.1-alpha'}]}], 'versions': ['2.0.0-alpha']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3376'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2012/Jul/78'}, {'type': 'WEB', 'url': 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_to...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T21:25:16Z', 'nvd_published_at': '2012-07-12T19:55:00Z'}
1.4.0
GHSA-qvhf-3567-pc4v
2023-01-05T20:11:47Z
2022-05-24T17:10:27Z
null
['CVE-2020-2135']
Sandbox bypass vulnerability in Script Security Plugin
Sandbox protection in Script Security Plugin 1.70 and earlier can be circumvented through:\n- Crafted constructor calls and bodies (due to an incomplete fix of [SECURITY-582](https://www.jenkins.io/security/advisory/2017-08-07/#super-constructor-calls)) - Crafted method calls on objects that implement `GroovyIntercepta...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.71'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.70'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2135'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/script-security-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1754'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/...
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T20:11:47Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}
1.4.0
GHSA-876p-4wgc-75rx
2023-07-28T21:26:42Z
2022-05-14T00:52:12Z
null
['CVE-2016-0785']
Apache Struts RCE Vulnerability
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a `%{}` sequence in a tag attribute, aka forced double OGNL evaluation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.3.28'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0785'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123095715/http://www.securityfocus.com/bid/85066'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220118185853/http://www.securitytracker.com/id/1035271'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T21:26:42Z', 'nvd_published_at': '2016-04-12T16:59:00Z'}
1.4.0
GHSA-f3qw-7p9p-j87f
2023-07-21T19:20:01Z
2022-05-13T01:20:58Z
null
['CVE-2018-8555']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8555'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5827'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/8943e332ea5c8d7bf7d89301b30a1412e318ae97'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:20:01Z', 'nvd_published_at': '2018-11-14T01:29:00Z'}
1.4.0
GHSA-j3cq-h6vh-gx7f
2022-12-16T20:30:17Z
2022-05-24T19:19:44Z
null
['CVE-2021-21689']
Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins
The agent-to-controller security subsystem limits which files on the Jenkins controller can be accessed by agent processes. Multiple vulnerabilities in the file path filtering implementation of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allow agent processes to read and write arbitrary files on the Jenkins con...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.303.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.304'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21689'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455'}]
{'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:48:33Z', 'nvd_published_at': '2021-11-04T17:15:00Z'}
1.4.0
GHSA-254q-rp36-v2m8
2022-07-08T19:08:08Z
2022-05-13T01:09:20Z
null
['CVE-2013-2160']
Missing XML Validation in Apache CXF
The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-frontend-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-frontend-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2160'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=929197'}, {'type': 'WEB', 'url': 'https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e...
{'cwe_ids': ['CWE-112'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:08:08Z', 'nvd_published_at': '2013-08-19T23:55:00Z'}
1.4.0
GHSA-6q4j-8pjm-5mgc
2023-08-11T18:53:13Z
2022-05-24T17:10:09Z
null
['CVE-2020-9757']
SEOmatic for CraftCMS allows Server-Side Template Injection
The Seomatic component before 3.2.46 for Craft CMS allows Server-Side Template Injection and information disclosure via malformed data to the metacontainers controller.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nystudio107/craft-seomatic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9757'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/65ab659cb6c914c7ad671af1e417c0da2431f79b'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/a1c2cad7e126132d2442ec8ec8e9ab43df02cc0f'}...
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T21:45:20Z', 'nvd_published_at': '2020-03-04T17:15:00Z'}
1.4.0
GHSA-vvf9-fxhv-4rgj
2023-09-25T19:14:36Z
2022-05-24T16:52:28Z
null
['CVE-2019-7942']
Magento 2 Community Edition RCE
A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with admin privileges to create or edit a product can execute arbitrary code via malicious XML layout updates.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7942'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:20:20Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-8p5c-f836-m4h7
2023-09-26T19:28:50Z
2022-05-24T17:00:29Z
null
['CVE-2019-8158']
Magento 2 Community Edition XML Injection
An XPath entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An attacker can craft a GET request to page cache block rendering module that gets passed to XML data processing engine without validation. The crafted key/value GET request data allows an attacker to ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8158'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-91'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:15:33Z', 'nvd_published_at': '2019-11-06T01:15:00Z'}
1.4.0
GHSA-vwhv-j36g-5rm8
2022-11-03T23:01:19Z
2022-05-14T01:57:02Z
null
['CVE-2015-5169']
Cross-site Scripting in Apache Struts
When the Struts2 debug mode is turned on, under certain conditions an arbitrary script may be executed in the 'Problem Report' screen. Also if JSP files are exposed to be accessed directly it's possible to execute an arbitrary script. It is generally not advisable to have debug mode switched on outside of the develop...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5169'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1260087'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180629-0003/'}, {'type': 'WEB...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:01:19Z', 'nvd_published_at': '2017-09-25T21:29:00Z'}
1.4.0
GHSA-v4mq-p756-p4f5
2022-11-22T19:45:54Z
2022-05-13T01:30:27Z
null
['CVE-2018-13864']
Play Framework's Assets controller vulnerable to directory traversal
A directory traversal vulnerability has been found in the Assets controller in Play Framework 2.6.12 through 2.6.15 (fixed in 2.6.16) when running on Windows. It allows a remote attacker to download arbitrary files from the target server via specially crafted HTTP requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.12'}, {'fixed': '2.6.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13864'}, {'type': 'WEB', 'url': 'https://discuss.lightbend.com/t/play-2-6-16-released/1575'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability/CVE-2018-13864-PathTraversal'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:45:54Z', 'nvd_published_at': '2018-07-17T12:29:00Z'}
1.4.0
GHSA-6j22-wv8g-894f
2022-05-19T20:29:04Z
2022-05-19T20:29:04Z
null
['CVE-2022-29230']
Potential Cross-site Scripting vulnerability in Hydrogen
### Impact There is a potential Cross-Site Scripting (XSS) vulnerability where an arbitrary user is able to execute scripts on pages that are built with Hydrogen. This affects all versions of Hydrogen starting from version 0.10.0 to 0.18.0. This vulnerability is exploitable in applications whose hydrating data is user ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@shopify/hydrogen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.19.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Shopify/hydrogen/security/advisories/GHSA-6j22-wv8g-894f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29230'}, {'type': 'WEB', 'url': 'https://github.com/Shopify/hydrogen/pull/1272'}, {'type': 'PACKAGE', 'url': 'https://github.com/Shopify/hydrogen...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-19T20:29:04Z', 'nvd_published_at': '2022-05-18T21:15:00Z'}
1.4.0
GHSA-9cqh-5x6g-wgm9
2022-11-01T22:36:28Z
2022-05-17T00:36:06Z
null
['CVE-2016-8744']
Deserialization of Untrusted Data in Apache Brooklyn
Apache Brooklyn uses the SnakeYAML library for parsing YAML inputs. SnakeYAML allows the use of YAML tags to indicate that SnakeYAML should unmarshal data to a Java type. In the default configuration in Brooklyn before 0.10.0, SnakeYAML will allow unmarshalling to any Java type available on the classpath. This could pr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.brooklyn:brooklyn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8744'}, {'type': 'WEB', 'url': 'https://brooklyn.apache.org/community/security/CVE-2016-8744.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f4d09c1c1a3cdfd1da0a05c8362769b917c078eed5b6c2f8e37a761@%3Cdev.brooklyn.apache.org%3E...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:36:28Z', 'nvd_published_at': '2017-09-13T16:29:00Z'}
1.4.0
GHSA-738x-v49g-p6hx
2023-08-23T18:40:14Z
2022-05-24T17:26:55Z
null
['CVE-2020-24715']
Scalyr Agent 2 Missing SSL Certificate Validation
The Scalyr Agent before 2.1.10 has Missing SSL Certificate Validation because, in some circumstances, native Python code is used that lacks a comparison of the hostname to commonName and subjectAltName.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'scalyr-agent-2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24715'}, {'type': 'PACKAGE', 'url': 'https://github.com/scalyr/scalyr-agent-2'}, {'type': 'WEB', 'url': 'https://github.com/scalyr/scalyr-agent-2/blob/v2.1.10/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211209045826/https:...
{'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T20:29:13Z', 'nvd_published_at': '2020-08-27T22:15:00Z'}
1.4.0
GHSA-wrrj-r2j4-969w
2023-07-24T20:54:51Z
2022-05-14T01:44:31Z
null
['CVE-2018-17256']
Umbraco CMS vulnerable to stored XSS
Persistent cross-site scripting (XSS) vulnerability in Umbraco CMS 7.12.3 allows authenticated users to inject arbitrary web script via the Header Name of a content (Blog, Content Page, etc.). The vulnerability is exploited when updating or removing public access of a content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'umbraco'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.12.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17256'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T20:54:51Z', 'nvd_published_at': '2018-11-27T19:29:00Z'}
1.4.0
GHSA-g2fm-x3cp-mqw9
2022-11-01T22:59:30Z
2022-05-14T01:05:57Z
null
['CVE-2016-8748']
Cross-site Scripting in Apache NiFi
In Apache NiFi before 1.0.1 and 1.1.x before 1.1.1, there is a cross-site scripting vulnerability in connection details dialog when accessed by an authorized user. The user supplied text was not being properly handled when added to the DOM.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8748'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2016-8748'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95621'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:59:30Z', 'nvd_published_at': '2017-10-19T20:29:00Z'}