schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-62fp-j75q-mqhc | 2022-12-06T21:25:51Z | 2022-05-24T16:58:48Z | null | ['CVE-2019-10437'] | Jenkins CRX Content Package Deployer Plugin subject to Cross-Site Request Forgery | A cross-site request forgery vulnerability in Jenkins CRX Content Package Deployer Plugin prior to 1.9 allowed attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. This issue is patched in version 1.9 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:crx-content-package-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10437'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/crx-content-package-deployer-plugin/commit/1313c422170a064dab0f9359324ff27e30a9f4a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/crx-content-package-deployer-plugin/'}, {'... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:25:51Z', 'nvd_published_at': '2019-10-16T14:15:00Z'} |
1.4.0 | GHSA-2cvf-r9jm-4qm9 | 2023-07-19T20:01:06Z | 2022-05-13T01:14:22Z | null | ['CVE-2019-3830'] | Ceilometer Prints Sensitive Configuration Data to Log | A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ceilometer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0.0rc1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3830'}, {'type': 'WEB', 'url': 'https://github.com/openstack/ceilometer/commit/8881a42af169a2d7c912b1434911f978883c83f3'}, {'type': 'WEB', 'url': 'https://github.com/openstack/ceilometer/commit/8881a42af169a2d7c912b1434911f978883c83f3#diff-f2d22735... | {'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T20:01:06Z', 'nvd_published_at': '2019-03-26T18:29:00Z'} |
1.4.0 | GHSA-qv6f-rcv6-6q3x | 2022-12-13T15:03:32Z | 2022-05-24T17:39:12Z | null | ['CVE-2021-21604'] | Improper handling of REST API XML deserialization errors in Jenkins | Jenkins provides XML REST APIs to configure views, jobs, and other items. When deserialization fails because of invalid data, Jenkins 2.274 and earlier, LTS 2.263.1 and earlier stores invalid object references created through these endpoints in the Old Data Monitor. If an administrator discards the old data, some erron... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.263.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.263.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21604'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-1923'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:51:53Z', 'nvd_published_at': '2021-01-13T16:15:00Z'} |
1.4.0 | GHSA-69wp-3pm3-hxgg | 2022-11-04T22:36:16Z | 2022-05-24T17:13:14Z | null | ['CVE-2019-17564'] | Deserialization of Untrusted Data in Apache Dubbo | Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo-rpc-http-invoker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17564'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/commit/9b18fe228971eaeca9b87d7b7e95df1c2a8ff91b'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4275'}, {'type': 'WEB', 'url': 'https://github.com/apache/du... | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T22:36:16Z', 'nvd_published_at': '2020-04-01T22:15:00Z'} |
1.4.0 | GHSA-6565-fg86-6jcx | 2023-08-04T23:14:41Z | 2022-05-17T03:34:12Z | null | ['CVE-2015-2241'] | Django Cross-site Scripting Vulnerability | Cross-site scripting (XSS) vulnerability in the contents function in `admin/helpers.py` in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in `ModelAdmin.readonly_fields`, as demonstrated by an `@property`. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8a1'}, {'f... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2241'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2654e1b93923bac55f12b4e66c5e39b16695ace5'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/82c9169077a066995e3b00aac551bf1c8a89d98a'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T23:14:41Z', 'nvd_published_at': '2015-03-12T14:59:00Z'} |
1.4.0 | GHSA-fm53-mpmp-7qw2 | 2022-05-25T22:55:25Z | 2022-05-25T22:55:25Z | null | ['CVE-2022-30999'] | Possible cross-site scripting attack via unsanitized SVG files in FoF Upload | ### Impact
If FoF Upload is configured to allow the uploading of SVG files (`image/svg+xml`), navigating directly to an SVG file URI could execute arbitrary Javascript code decided by an attacker.
This Javascript code could include the execution of HTTP web requests to Flarum, or any other web service. This could allo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'fof/upload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/FriendsOfFlarum/upload/security/advisories/GHSA-fm53-mpmp-7qw2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30999'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfFlarum/upload/issues/68'}, {'type': 'WEB', 'url': 'https://github.com/FriendsO... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:55:25Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-6xw9-qq9h-cr68 | 2022-12-06T21:44:47Z | 2022-05-24T16:59:38Z | null | ['CVE-2019-10461'] | Jenkins Dynatrace Plugin vulnerable to Insufficiently Protected Credentials | Jenkins Dynatrace Application Monitoring Plugin prior to 2.1.4 stores credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
##NOTE: This plugin is marked as DEPRECATED | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dynatrace-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10461'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dynatrace-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1477'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/... | {'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:44:47Z', 'nvd_published_at': '2019-10-23T13:15:00Z'} |
1.4.0 | GHSA-p84x-5xx8-hff9 | 2023-09-26T20:02:48Z | 2022-05-24T22:01:17Z | null | ['CVE-2019-19729'] | bson-objectid contains Improper input validation | An issue was discovered in the BSON ObjectID (aka bson-objectid) package 1.3.0 for Node.js. ObjectID() allows an attacker to generate a malformed objectid by inserting an additional property to the user-input, because bson-objectid will return early if it `detects _bsontype==ObjectID` in the user-input object. As a res... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bson-objectid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19729'}, {'type': 'WEB', 'url': 'https://github.com/williamkapke/bson-objectid/issues/30'}, {'type': 'PACKAGE', 'url': 'https://github.com/cabinjs/bson-objectid'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/bson-objectid'}] | {'cwe_ids': ['CWE-20', 'CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T21:09:18Z', 'nvd_published_at': '2019-12-11T20:15:00Z'} |
1.4.0 | GHSA-5xp2-rv4h-mm2q | 2023-08-01T23:29:14Z | 2022-05-24T16:48:40Z | null | ['CVE-2019-10133'] | Moodle Open Redirect Vulnerability | A flaw was found in Moodle before 3.7, 3.6.4, 3.5.6, 3.4.9 and 3.1.18. The form to upload cohorts contained a redirect field, which was not restricted to internal URLs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.6.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECO... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10133'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/c509d108216524887c7ca08b1c451054d669ea75'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10133'}, {'type': 'WEB', 'url': 'https://moodle.org/mo... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:29:14Z', 'nvd_published_at': '2019-06-26T19:15:00Z'} |
1.4.0 | GHSA-xhfc-gr8f-ffwc | 2022-07-07T23:26:16Z | 2022-05-24T16:45:53Z | null | ['CVE-2019-0980'] | Denial of service in ASP.NET Core | A denial of service vulnerability exists when .NET Framework or .NET Core improperly handle web requests, aka '.Net Framework and .Net Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0820, CVE-2019-0981. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'System.Private.Uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0980'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/112'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidanc... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:26:16Z', 'nvd_published_at': '2019-05-16T19:29:00Z'} |
1.4.0 | GHSA-wm7h-9275-46v2 | 2023-08-28T14:22:54Z | 2022-05-21T00:00:25Z | null | ['CVE-2022-24434'] | Crash in HeaderParser in dicer | This affects all versions of the package `dicer`. A malicious attacker can send a modified form to the server and crash the Node.js service. A complete denial of service can be achieved by sending the malicious form in a loop. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'dicer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:dicer'}, 'ecosystem_specific': {'affected_functions': ['']}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24434'}, {'type': 'WEB', 'url': 'https://github.com/mscdex/busboy/issues/250'}, {'type': 'WEB', 'url': 'https://github.com/mscdex/dicer/pull/22'}, {'type': 'WEB', 'url': 'https://github.com/mscdex/dicer/commit/b7fca2e93e8e9d4439d8acc5c02f5e54a0112d... | {'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:22:41Z', 'nvd_published_at': '2022-05-20T20:15:00Z'} |
1.4.0 | GHSA-vgxq-xv7f-jxjx | 2023-07-21T22:03:38Z | 2022-05-13T01:20:46Z | null | ['CVE-2018-8290'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8280, CVE-2018-8286, CVE-2018-8294. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8290'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5444'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/8bd6826aea01ff1af36f2a83fe00c44799ba80cb'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:03:38Z', 'nvd_published_at': '2018-07-11T00:29:00Z'} |
1.4.0 | GHSA-254j-mmc5-qhpx | 2023-01-27T00:53:50Z | 2022-05-24T19:06:56Z | null | ['CVE-2021-35440'] | Smashing Cross-site Scripting vulnerability | Smashing 1.3.4 is vulnerable to Cross Site Scripting (XSS). A URL for a widget can be crafted and used to execute JavaScript on the victim's computer. The JavaScript code can then steal data available in the session/cookies depending on the user environment (e.g. if re-using internal URL's for deploying, or cookies tha... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'smashing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35440'}, {'type': 'WEB', 'url': 'https://github.com/Smashing/smashing/pull/186'}, {'type': 'WEB', 'url': 'https://github.com/Smashing/smashing/pull/186/commits/f4648137ae77aa2a9ccd14b2e6eeaed2cfb32da3'}, {'type': 'PACKAGE', 'url': 'https://github.c... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:53:50Z', 'nvd_published_at': '2021-07-06T15:15:00Z'} |
1.4.0 | GHSA-h8v5-p258-pqf4 | 2022-05-24T12:47:10Z | 2022-05-24T12:47:10Z | null | ['CVE-2022-29161'] | Use of a Broken or Risky Cryptographic Algorithm in XWiki Crypto API | ### Impact
XWiki Crypto API will generate X509 certificates signed by default using SHA1 with RSA, which is not considered safe anymore for use in certificate signatures, due to the risk of collisions with SHA1.
Note that this API is never used in XWiki Standard but it might be used in some extensions of XWiki.
### Pa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introd... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h8v5-p258-pqf4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29161'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/26728f3f23658288683667a5182a916c7ecefc52'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-326', 'CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T12:47:10Z', 'nvd_published_at': '2022-05-06T00:15:00Z'} |
1.4.0 | GHSA-2w4h-f44w-968f | 2022-06-21T20:12:33Z | 2022-05-24T19:09:23Z | null | ['CVE-2021-34802'] | Improper Privilege Management in Neo4j Graph Database | A failure in resetting the security context in some transaction actions in Neo4j Graph Database 4.2 could allow authenticated users to execute commands with elevated privileges. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j:neo4j-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34802'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j/neo4j'}, {'type': 'WEB', 'url': 'https://neo4j.com'}, {'type': 'WEB', 'url': 'https://neo4j.com/developer/kb/neo4j-4-2-x-sec-vuln-fix/'}] | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:12:33Z', 'nvd_published_at': '2021-07-30T14:15:00Z'} |
1.4.0 | GHSA-wq2p-q66w-q8gp | 2023-08-17T23:32:20Z | 2022-05-14T01:10:35Z | null | ['CVE-2013-4322'] | Apache Tomcat Denial of Service vulnerability | Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by stream... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4322'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1069905'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=e... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T23:32:20Z', 'nvd_published_at': '2014-02-26T14:55:00Z'} |
1.4.0 | GHSA-w47p-5q88-hj5g | 2022-11-03T19:13:38Z | 2022-05-17T03:56:49Z | null | ['CVE-2016-0709'] | Path Traversal in Apache Jetspeed | Directory traversal vulnerability in the Import/Export function in the Portal Site Manager in Apache Jetspeed before 2.3.1 allows remote authenticated administrators to write to arbitrary files, and consequently execute arbitrary code, via a .. (dot dot) in a ZIP archive entry, as demonstrated by "../../webapps/x.jsp." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.jetspeed-2:jetspeed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0709'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/portals-jetspeed-user/201603.mbox/%3C281D02D0-6A03-4421-9D86-E73B001C8677@bluesunrise.com%3E'}, {'type': 'WEB', 'url': 'https://portals.apache.org/jetspeed-2/security-reports... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:13:38Z', 'nvd_published_at': '2016-04-11T14:59:00Z'} |
1.4.0 | GHSA-rvww-w62m-hch8 | 2023-01-05T21:26:43Z | 2022-05-24T17:29:16Z | null | ['CVE-2020-2281'] | CSRF vulnerability in Jenkins Lockable Resources Plugin | Lockable Resources Plugin 2.8 and earlier does not require POST requests for several HTTP endpoints, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to reserve, unreserve, unlock, and reset resources. Lockable Resources Plugin 2.9 requires POST requests for the affect... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.6wind.jenkins:lockable-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2281'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/lockable-resources-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-1958'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T21:26:43Z', 'nvd_published_at': '2020-09-23T14:15:00Z'} |
1.4.0 | GHSA-69q7-hww4-8pjq | 2023-07-13T17:08:08Z | 2022-05-24T17:06:46Z | null | ['CVE-2020-5502'] | phpBB allows CSRF | phpBB 3.2.8 allows a CSRF attack that can approve pending group memberships. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpbb/phpbb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.8'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5502'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpbb/phpbb'}, {'type': 'WEB', 'url': 'https://www.phpbb.com/community/viewtopic.php?f=14&t=2534536'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:08:08Z', 'nvd_published_at': '2020-01-15T00:15:00Z'} |
1.4.0 | GHSA-vjf9-8wqg-xc7r | 2023-07-21T20:20:31Z | 2022-05-13T01:20:56Z | null | ['CVE-2018-8510'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8503, CVE-2018-8505, CVE-2018-8511, CVE-2018-8... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8510'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5764'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/9b36ce832c9a81bb51e3b1a39067feadcd1e14d2'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:20:31Z', 'nvd_published_at': '2018-10-10T13:29:00Z'} |
1.4.0 | GHSA-jh3j-xfv2-f9m9 | 2023-09-26T20:40:08Z | 2022-05-24T17:11:33Z | null | ['CVE-2019-19209'] | Dolibarr ERP and CRM SQLi | Dolibarr ERP/CRM before 10.0.3 allows SQL Injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19209'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/security-advisories/usd-2019-0051/'}, {'type': 'WEB', 'url': 'https://www.dolibarr.org/forum/dolibarr-changelogs'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T23:45:02Z', 'nvd_published_at': '2020-03-16T15:15:00Z'} |
1.4.0 | GHSA-g466-57gh-cqfw | 2023-01-27T00:09:31Z | 2022-05-17T05:30:58Z | null | ['CVE-2008-7311'] | Spree uses a hardcoded hash value | The session cookie store implementation in Spree 0.2.0 uses a hardcoded `config.action_controller_session` hash value (aka secret key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging an application that contains this value within the `config/environment.rb` file. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-7311'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2008-7311.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree'}, {'type': 'WEB', 'url': 'https://spreecommerce.com/blog/security-vu... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:09:31Z', 'nvd_published_at': '2012-04-05T13:25:00Z'} |
1.4.0 | GHSA-wx54-3278-m5g4 | 2022-06-02T22:17:28Z | 2022-05-20T00:00:38Z | null | ['CVE-2022-22976'] | Integer overflow in BCrypt class in Spring Security | Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not aff... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'ev... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22976'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220707-0003/'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22976'... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:21:14Z', 'nvd_published_at': '2022-05-19T15:15:00Z'} |
1.4.0 | GHSA-v4vm-gj2x-6qhm | 2023-08-15T22:34:06Z | 2022-05-17T19:57:24Z | null | ['CVE-2014-8328'] | DCE extension for Typo3 Discloses Environment Information | The default configuration in the Dynamic Content Elements (dce) extension before 0.11.5 for TYPO3 allows remote attackers to obtain sensitive installation environment information by reading the update check request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 't3/dce'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8328'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/97673'}, {'type': 'PACKAGE', 'url': 'https://github.com/a-r-m-i-n/dce'}, {'type': 'WEB', 'url': 'http://typo3.org/extensions/repository/view/dce'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T22:34:06Z', 'nvd_published_at': '2020-02-03T14:15:00Z'} |
1.4.0 | GHSA-jjq8-vfjq-j6v4 | 2022-07-06T20:11:51Z | 2022-05-14T02:48:01Z | null | ['CVE-2015-5531'] | Improper Limitation of a Pathname to a Restricted Directory in Elasticsearch | Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5531'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/38383/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/132721/Elasticsearch-Directory-Traversa... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:11:51Z', 'nvd_published_at': '2015-08-17T15:59:00Z'} |
1.4.0 | GHSA-h8wp-wgcq-qhrf | 2022-07-06T20:04:55Z | 2022-05-24T17:04:48Z | null | ['CVE-2016-1000229'] | Improper Neutralization of Input During Web Page Generation in swagger-ui | swagger-ui has XSS in key names | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000229'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0868'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000229'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:04:55Z', 'nvd_published_at': '2019-12-20T14:15:00Z'} |
1.4.0 | GHSA-2c79-h2h5-g3fw | 2022-12-16T20:33:58Z | 2022-05-24T19:19:44Z | null | ['CVE-2021-21691'] | Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins | The agent-to-controller security subsystem limits which files on the Jenkins controller can be accessed by agent processes.
Multiple vulnerabilities in the file path filtering implementation of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allow agent processes to read and write arbitrary files on the Jenkins con... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.303.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.303.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21691'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455'}] | {'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:48:06Z', 'nvd_published_at': '2021-11-04T17:15:00Z'} |
1.4.0 | GHSA-8qh4-fghr-6fxg | 2022-06-28T16:02:05Z | 2022-05-24T16:58:49Z | null | ['CVE-2019-10436'] | Improper Limitation of a Pathname to a Restricted Directory in Jenkins Google OAuth Credentials Plugin | An arbitrary file read vulnerability in Jenkins Google OAuth Credentials Plugin 0.9 and earlier allowed attackers able to configure jobs and credentials in Jenkins to obtain the contents of any file on the Jenkins master. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-oauth-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10436'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/google-oauth-plugin/commit/aef26a8425e515a9986412000d6191db95fa9e56'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-oauth-plugin'}, {'type': 'WEB', 'url': 'https://jen... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T16:02:05Z', 'nvd_published_at': '2019-10-16T14:15:00Z'} |
1.4.0 | GHSA-44hv-jjx7-qfjg | 2022-11-03T22:48:46Z | 2022-05-14T00:54:13Z | null | ['CVE-2016-6795'] | Path Traversal in Apache Struts | In Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side. This vulnerability is only exploitable when using the Struts 2 Convention plugin in conjunction with Apache Struts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6795'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180629-0003/'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-042.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/93773'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:48:46Z', 'nvd_published_at': '2017-09-20T17:29:00Z'} |
1.4.0 | GHSA-2f4c-8rp6-fh6q | 2022-12-28T22:47:35Z | 2022-05-24T17:28:27Z | null | ['CVE-2020-2275'] | Arbitrary file read vulnerability in Copy data to workspace Jenkins Plugin | Jenkins Copy data to workspace Plugin 1.0 and earlier does not limit which directories can be copied from the Jenkins controller to job workspaces, allowing attackers with Job/Configure permission to read arbitrary files on the Jenkins controller. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:copy-data-to-workspace-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2275'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/copy-data-to-workspace-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1966'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/os... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T22:47:35Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-fg9w-cffm-pmh2 | 2022-07-01T17:02:04Z | 2022-05-13T01:45:59Z | null | ['CVE-2017-4971'] | Insecure Default Initialization of Resource in Pivotal Spring Web Flow | An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not hav... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.webflow:spring-webflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-4971'}, {'type': 'WEB', 'url': 'https://jira.spring.io/browse/SWF-1700'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2017-4971'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98785'}] | {'cwe_ids': ['CWE-1188'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:02:04Z', 'nvd_published_at': '2017-06-13T06:29:00Z'} |
1.4.0 | GHSA-ph3w-2843-72mx | 2022-06-02T20:36:41Z | 2022-05-30T00:00:30Z | null | ['CVE-2022-1928'] | Stored Cross-site Scripting in gitea | Cross-site Scripting (XSS) - Stored in GitHub repository go-gitea/gitea prior to 1.16.9 via unfiltered pdfs | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1928'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/19825'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/commit/65e0688a5c9dacad50e71024b7529fdf0e3c2e9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/git... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:36:41Z', 'nvd_published_at': '2022-05-29T14:15:00Z'} |
1.4.0 | GHSA-xmvg-c4x3-9qwp | 2023-07-21T17:44:24Z | 2022-05-13T01:18:41Z | null | ['CVE-2018-0980'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0990, CVE-2018-0993, CVE-2018-0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0980'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/af07d28d486843bbd1fdefe742a9c090026b32ee'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0980'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T17:44:24Z', 'nvd_published_at': '2018-04-12T01:29:00Z'} |
1.4.0 | GHSA-2wf5-4mf7-vmh3 | 2022-12-21T19:37:09Z | 2022-05-24T17:33:07Z | null | ['CVE-2020-2303'] | CSRF vulnerability in Jenkins Active Directory Plugin | Active Directory Plugin 2.19 and earlier does not require POST requests for multiple HTTP endpoints implementing connection and authentication tests, resulting in cross-site request forgery (CSRF) vulnerabilities.
This vulnerability allows attackers to perform connection tests, connecting to attacker-specified or prev... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:active-directory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2303'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/active-directory-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2126'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T19:36:47Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-rx7j-mw4c-76g9 | 2023-01-26T23:55:17Z | 2022-05-14T00:54:20Z | null | ['CVE-2012-6497'] | Authlogic Information Exposure vulnerability | The Authlogic gem for Ruby on Rails prior to version 3.3.0 makes potentially unsafe `find_by_id` method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL injection attacks via a crafted parameter in environments that have a known secret_token value, as demonstrated by a value contained in `secret_t... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'authlogic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6497'}, {'type': 'WEB', 'url': 'https://github.com/binarylogic/authlogic/pull/341'}, {'type': 'WEB', 'url': 'https://github.com/binarylogic/authlogic/commit/1d57a6c4abe43a3c0b4ef578486ea00e1f7a9873'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:55:17Z', 'nvd_published_at': '2013-01-04T04:46:00Z'} |
1.4.0 | GHSA-46p2-fwqg-3h6m | 2022-06-30T18:52:28Z | 2022-05-13T01:48:31Z | null | ['CVE-2018-1000110'] | Incorrect Authorization in Jenkins Git Plugin | An improper authorization vulnerability exists in Jenkins Git Plugin version 3.7.0 and earlier in GitStatus.java that allows an attacker with network access to obtain a list of nodes and users. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.7.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000110'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/git-plugin/commit/a3d3a7eb7f75bfe97a0291e3b6d074aafafa86c9'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security... | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T18:52:28Z', 'nvd_published_at': '2018-03-13T13:29:00Z'} |
1.4.0 | GHSA-j696-6m57-mcrv | 2023-07-27T00:42:17Z | 2022-05-17T00:29:00Z | null | ['CVE-2017-14498'] | Silverstripe CMS XSS Vulnerability | SilverStripe CMS before 3.6.1 has XSS via an SVG document that is mishandled by (1) the Insert Media option in the content editor or (2) an admin/assets/add pathname, as demonstrated by the admin/pages/edit/EditorToolbar/MediaForm/field/AssetUploadField/upload URI, aka issue SS-2017-017. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14498'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/commit/25b77a2ff8deabe8e8894002b9a5647eaec27b0a'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-installer/commit/c25478bef75cc5482852e80... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T00:42:17Z', 'nvd_published_at': '2017-09-15T18:29:00Z'} |
1.4.0 | GHSA-f4w6-3rh6-6q4q | 2023-07-18T22:01:34Z | 2022-05-24T17:02:42Z | null | ['CVE-2019-11255'] | Kubernetes CSI Sidecar Containers Can Allow Unauthorized Data Access | Improper input validation in Kubernetes CSI sidecar containers for external-provisioner (<v0.4.3, <v1.0.2, v1.1, <v1.2.2, <v1.3.1), external-snapshotter (<v0.4.2, <v1.0.2, v1.1, <1.2.2), and external-resizer (v0.1, v0.2) could result in unauthorized PersistentVolume data access or volume mutation during snapshot, resto... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes-csi/external-provisioner'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes-csi/external-provisioner... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11255'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/85233'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4054'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4096'}, {'type':... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:01:34Z', 'nvd_published_at': '2019-12-05T16:15:00Z'} |
1.4.0 | GHSA-mw6j-hh29-h379 | 2022-05-25T19:33:50Z | 2022-05-25T19:33:50Z | null | [] | `CHECK` failure in depthwise ops via overflows | ### Impact
The implementation of depthwise ops in TensorFlow is vulnerable to a denial of service via `CHECK`-failure (assertion failure) caused by overflowing the number of elements in a tensor:
```python
import tensorflow as tf
input = tf.constant(1, shape=[1, 4, 4, 3], dtype=tf.float32)
filter_sizes = tf.constant(... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mw6j-hh29-h379'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3796cc4fcd93ae55812a457abc96dcd55fbb854b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:33:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6g57-h38c-q52g | 2022-06-29T15:49:32Z | 2022-05-14T01:29:12Z | null | ['CVE-2018-8718'] | Cross-Site Request Forgery in Jenkins Mailer Plugin | Cross-site request forgery (CSRF) vulnerability in the Mailer Plugin 1.20 for Jenkins 2.111 allows remote authenticated users to send unauthorized mail as an arbitrary user via a /descriptorByName/hudson.tasks.Mailer/sendTestMail request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.20'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8718'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/44843/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2018/03/26/3'}, {'type': 'W... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T15:49:32Z', 'nvd_published_at': '2018-03-27T16:29:00Z'} |
1.4.0 | GHSA-x68x-wvm2-hqc8 | 2022-12-20T22:42:08Z | 2022-05-24T17:19:04Z | null | ['CVE-2020-2195'] | Stored XSS vulnerability in Jenkins Compact Columns Plugin | Compact Columns Plugin 1.11 and earlier displays the unprocessed job description in tooltips.
This results in a stored cross-site scripting vulnerability that can be exploited by users with Job/Configure permission.
Compact Columns Plugin 1.12 applies the configured markup formatter to the job description shown in to... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:compact-columns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2195'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compact-columns-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1837'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:42:08Z', 'nvd_published_at': '2020-06-03T13:15:00Z'} |
1.4.0 | GHSA-qcqr-hcjq-whfq | 2022-07-12T22:14:44Z | 2022-05-17T00:15:12Z | null | ['CVE-2016-4993'] | Improper Neutralization of CRLF Sequences in Wildfly Undertow | CRLF injection vulnerability in the Undertow web server in WildFly 10.0.0, as used in Red Hat JBoss Enterprise Application Platform (EAP) 7.x before 7.0.2, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-undertow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0.Final'}, {'fixed': '11.0.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.1.0.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4993'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/834496fb74ddda2af197940c70d08bab419fdf12'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3454'}, {'type': 'WEB', 'url': 'https://access.redhat.com/... | {'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:14:44Z', 'nvd_published_at': '2016-09-26T14:59:00Z'} |
1.4.0 | GHSA-5957-5crx-79jx | 2023-08-01T21:29:03Z | 2022-05-24T17:07:24Z | null | ['CVE-2015-3154'] | Zenario CMS vulnerable to CRLF injection | CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'f... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3154'}, {'type': 'WEB', 'url': 'http://framework.zend.com/security/advisory/ZF2015-04'}] | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T21:29:03Z', 'nvd_published_at': '2020-01-27T16:15:00Z'} |
1.4.0 | GHSA-v4f8-2847-rwm7 | 2023-07-10T13:02:34Z | 2022-05-24T19:02:44Z | null | ['CVE-2021-3518'] | Nokogiri Implements libxml2 version vulnerable to use-after-free | There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3518'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1954242'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-3518.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T21:16:34Z', 'nvd_published_at': '2021-05-18T12:15:00Z'} |
1.4.0 | GHSA-j7h6-xr7g-m2c5 | 2023-08-16T09:36:55Z | 2022-05-17T03:28:23Z | null | ['CVE-2013-4316'] | Code injection in Apache Struts | Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.15.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4316'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html'}, {'type': 'WEB', 'url': 'http://struts.apache.org/release/2.3.x/docs/s2-019.html'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:43:48Z', 'nvd_published_at': '2013-09-30T21:55:00Z'} |
1.4.0 | GHSA-8x3m-m3x9-54fj | 2022-09-12T16:17:03Z | 2022-05-13T01:12:09Z | null | ['CVE-2018-7206'] | JupyterHub OAuthenticator elevation of privilege | An issue was discovered in Project Jupyter JupyterHub OAuthenticator 0.6.x before 0.6.2 and 0.7.x before 0.7.3. When using JupyterHub with GitLab group whitelisting for access control, group membership was not checked correctly, allowing members not in the whitelisted groups to create accounts on the Hub. (Users were n... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'oauthenticator'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6'}, {'fixed': '0.6.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'oauthenticator'}, 'ecosystem_specific': {'affected_functions': ['']}, 'r... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7206'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/oauthenticator/commit/1845c0e4b1bff3462c91c3108c85205acd3c75a2'}, {'type': 'WEB', 'url': 'https://blog.jupyter.org/security-fix-for-jupyterhub-gitlab-oauthenticator-7b14571d1f76'}, {'typ... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T16:17:03Z', 'nvd_published_at': '2018-02-18T03:29:00Z'} |
1.4.0 | GHSA-3xjq-8j89-xrw9 | 2022-12-12T16:32:16Z | 2022-05-14T03:05:27Z | null | ['CVE-2018-1000604'] | Jenkins Badge Plugin cross-site scripting vulnerability | A persisted cross-site scripting vulnerability exists in Jenkins Badge Plugin 1.4 and earlier in BadgeSummaryAction.java, HtmlBadgeAction.java that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions. Ba... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:badge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000604'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/badge-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-25/#SECURITY-906'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:32:16Z', 'nvd_published_at': '2018-06-26T17:29:00Z'} |
1.4.0 | GHSA-85vg-grr5-pw42 | 2022-05-18T19:29:59Z | 2022-05-04T00:00:22Z | null | ['CVE-2021-46440'] | Insecure password handling vulnerability in Strapi | Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request. From this, the attacker can get the victim's cookie, base64 decode it, and obtain a cleartext password, leading to getting API documentation f... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.9'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@strapi/strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46440'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/12246'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://hub.docker.com/r/strapi/strapi'}, {'type': 'WEB', 'url': 'https://strapi... | {'cwe_ids': ['CWE-922'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-18T19:29:59Z', 'nvd_published_at': '2022-05-03T18:15:00Z'} |
1.4.0 | GHSA-6c2v-xc8f-fvf7 | 2023-07-20T17:59:09Z | 2022-05-13T01:18:38Z | null | ['CVE-2018-0937'] | ChakraCore RCE Vulnerability | ChakraCore and Microsoft Windows 10 1703 and 1709 allow remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874, CVE-2018-0930, CVE-2018-0931, CVE-2018-0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0937'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/069c3fb1e597f3eaea32092599de4a72bbecc365'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0937'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T17:59:09Z', 'nvd_published_at': '2018-03-14T17:29:00Z'} |
1.4.0 | GHSA-rfpg-2fp8-2fph | 2023-08-29T21:40:33Z | 2022-05-17T05:16:32Z | null | ['CVE-2012-5339'] | phpMyAdmin multiple cross-site scripting vulnerabilities | Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.3 allow remote authenticated users to inject arbitrary web script or HTML via a crafted name of (1) an event, (2) a procedure, or (3) a trigger. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5339'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/6ea8fad3f999bfdf79eb6fe31309592bca54d611'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/cfd688d2512df9827a8ecc0412fc264fc5bcb186'}, {'type':... | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:40:33Z', 'nvd_published_at': '2012-10-25T10:51:00Z'} |
1.4.0 | GHSA-h68c-4jh3-cp9j | 2023-07-13T17:07:47Z | 2022-05-24T17:11:40Z | null | ['CVE-2020-9471'] | Umbraco CMS Authenticated File Upload | Umbraco Cloud 8.5.3 allows an authenticated file upload (and consequently Remote Code Execution) via the Install Packages functionality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoCMS.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9471'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}, {'type': 'WEB', 'url': 'https://gitlab.com/eLeN3Re/cve-2020-9471'}, {'type': 'WEB', 'url': 'https://gitlab.com/eLeN3Re/cve-2020-9472/-/blob/master/CVE-2020-9472.pdf'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:07:47Z', 'nvd_published_at': '2020-03-16T20:15:00Z'} |
1.4.0 | GHSA-q4qq-8q2r-g2f2 | 2022-12-20T22:11:18Z | 2022-05-24T17:27:07Z | null | ['CVE-2020-2251'] | Passwords transmitted in plain text by Jenkins ReadyAPI Functional Testing Plugin | ReadyAPI Functional Testing Plugin stores project passwords in job `config.xml` files on the Jenkins controller as part of its configuration.
While these passwords are stored encrypted on disk since ReadyAPI Functional Testing Plugin 1.4, they are transmitted in plain text as part of the global configuration form by R... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:soapui-pro-functional-testing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2251'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/soapui-pro-functional-testing-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com... | {'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:11:18Z', 'nvd_published_at': '2020-09-01T14:15:00Z'} |
1.4.0 | GHSA-vpjm-58cw-r8q5 | 2022-12-13T15:17:03Z | 2022-05-24T17:39:12Z | null | ['CVE-2021-21602'] | Arbitrary file read vulnerability in workspace browsers in Jenkins | The file browser for workspaces, archived artifacts, and `$JENKINS_HOME/userContent/` follows symbolic links to locations outside the directory being browsed in Jenkins 2.274 and earlier, LTS 2.263.1 and earlier.
This allows attackers with Job/Workspace permission and the ability to control workspace contents (e.g., w... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.263.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.263.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21602'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-1452'}] | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:52:14Z', 'nvd_published_at': '2021-01-13T16:15:00Z'} |
1.4.0 | GHSA-qwgx-mrv5-87j8 | 2022-12-02T21:08:26Z | 2022-05-18T00:00:39Z | null | ['CVE-2022-30946'] | CSRF vulnerability in Jenkins Script Security Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Script Security Plugin 1158.v7c1b_73a_69a_08 and earlier allows attackers to have Jenkins send an HTTP request to an attacker-specified webserver. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1172.v35f6a'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1158.v7c1b'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30946'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/script-security-plugin/commit/35f6a0b8207ed3a32a85f27c1312da6cd738eeaa'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/script-security-plugin'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:08:26Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-48hr-jg4p-w4p4 | 2022-12-13T18:55:52Z | 2022-05-24T17:43:01Z | null | ['CVE-2021-21619'] | XSS vulnerability in Jenkins Claim Plugin | Claim Plugin 2.18.1 and earlier does not escape the user display name shown in claims.
This results in a cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security realm, or directly inside Jenkins.
Everyone with a Jenkins acco... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:claim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.18.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21619'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/claim-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T18:55:52Z', 'nvd_published_at': '2021-02-24T16:15:00Z'} |
1.4.0 | GHSA-966r-962g-2jq5 | 2023-09-21T23:12:42Z | 2022-05-01T18:35:01Z | null | ['CVE-2007-5615'] | Mortbay Jetty CRLF Injection Vulnerability | CRLF injection vulnerability in Mortbay Jetty before 6.1.6rc0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.6rc0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5615'}, {'type': 'WEB', 'url': 'https://github.com/jetty-project/codehaus-jetty6/commit/0d2592ea3183914163d0921e4855bd3e18582a05'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20071007232422/http://svn.codehaus.org:80/jetty/jetty/trunk/VERS... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T23:12:42Z', 'nvd_published_at': '2007-12-05T11:46:00Z'} |
1.4.0 | GHSA-hc2f-7r5r-r2hg | 2022-06-06T18:13:49Z | 2022-05-24T22:15:20Z | null | ['CVE-2022-29210'] | Heap buffer overflow due to incorrect hash function in TensorFlow | ### Impact
The [`TensorKey` hash function](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/framework/tensor_key.h#L53-L64) used total estimated `AllocatedBytes()`, which (a) is an estimate per tensor, and (b) is a very poor hash function for constants (e.g. `int32_... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'e... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hc2f-7r5r-r2hg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29210'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1b85a28d395dc91f4d22b5f9e1e9a22e92ccecd6'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:15:20Z', 'nvd_published_at': '2022-05-21T00:15:00Z'} |
1.4.0 | GHSA-vfxc-r2gx-v2vq | 2023-09-29T16:02:16Z | 2022-05-24T16:46:55Z | null | ['CVE-2019-12496'] | Hybrid Group Gobot Improper Certificate Validation vulnerability | An issue was discovered in Hybrid Group Gobot before 1.13.0. The mqtt subsystem skips verification of root CA certificates by default.
### Specific Go Packages Affected
github.com/hybridgroup/gobot/platforms/mqtt | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hybridgroup/gobot'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.1-0.20190521122906-c1aa4f867846'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12496'}, {'type': 'WEB', 'url': 'https://github.com/hybridgroup/gobot/commit/c1aa4f867846da4669ecf3bc3318bd96b7ee6f3f'}, {'type': 'PACKAGE', 'url': 'https://github.com/hybridgroup/gobot'}, {'type': 'WEB', 'url': 'https://github.com/hybridgroup/gobo... | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:25:02Z', 'nvd_published_at': '2019-05-31T11:29:00Z'} |
1.4.0 | GHSA-vqxq-3wqv-r9xp | 2023-07-17T20:31:22Z | 2022-05-24T16:52:26Z | null | ['CVE-2019-7898'] | Magento 2 Community Edition Information Disclosure | Samples of disabled downloadable products are accessible in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 due to inadequate validation of user input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7898'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:31:22Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-9g33-48jh-jq7v | 2022-12-02T20:42:38Z | 2022-05-18T00:00:40Z | null | ['CVE-2022-30958'] | Cross Site Request Forgery in Jenkins SSH Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins SSH Plugin 2.6.1 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30958'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ssh-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2093'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:55:04Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-w53q-r5cw-6vjh | 2022-12-22T13:38:10Z | 2022-05-24T17:19:05Z | null | ['CVE-2020-2198'] | Missing permission check in Jenkins Project Inheritance Plugin | Jenkins Project Inheritance Plugin 21.04.03 and earlier does not redact encrypted secrets in the 'getConfigAsXML' API URL when transmitting job config.xml data to users without Job/Configure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'hudson.plugins:project-inheritance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.04.03'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2198'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1582'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/06/03/3'}] | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:38:10Z', 'nvd_published_at': '2020-06-03T13:15:00Z'} |
1.4.0 | GHSA-56wf-mx5c-ffjx | 2022-12-29T01:12:25Z | 2022-05-24T17:22:20Z | null | ['CVE-2020-2215'] | CSRF vulnerability in Jenkins Zephyr for JIRA Test Management Plugin | A cross-site request forgery vulnerability in Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified username and password. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:zephyr-for-jira-test-management'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2215'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/zephyr-for-jira-test-management-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1762'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lis... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:12:25Z', 'nvd_published_at': '2020-07-02T15:15:00Z'} |
1.4.0 | GHSA-7xx3-qp5w-fw96 | 2023-08-31T21:47:44Z | 2022-05-24T17:38:59Z | null | ['CVE-2020-36191'] | Cross-Site Request Forgery in JupyterHub | JupyterHub 1.1.0 allows CSRF in the admin panel via a request that lacks an `_xsrf` field, as demonstrated by a /hub/api/user request (to add or remove a user account). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'jupyterhub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0b1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36191'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/jupyterhub/issues/3304'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7xx3-qp5w-fw96'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/jupyterhub/releases'}, ... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T18:03:58Z', 'nvd_published_at': '2021-01-13T04:15:00Z'} |
1.4.0 | GHSA-wv88-pf73-x22p | 2022-07-13T17:45:52Z | 2022-05-17T02:16:01Z | null | ['CVE-2011-2730'] | Improper Neutralization of Directives in Dynamically Evaluated Code in Spring Framework | VMware SpringSource Spring Framework before 2.5.6.SEC03, 2.5.7.SR023, and 3.x before 3.0.6, when a container supports Expression Language (EL), evaluates EL expressions in tags twice, which allows remote attackers to obtain sensitive information via a (1) name attribute in a (a) spring:hasBindErrors tag; (2) path attri... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'f... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2730'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/1dc1xxO8UMFaGLOwgkykYdghGWm_2Gn0iCrxFsympqcE/edit'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-framework'}, {'type': 'WEB', 'url': 'http://bugs.debian.or... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:45:52Z', 'nvd_published_at': '2012-12-05T17:55:00Z'} |
1.4.0 | GHSA-rwx9-wqj8-vr77 | 2022-09-15T19:40:49Z | 2022-05-24T17:26:43Z | null | ['CVE-2020-24653'] | Expo on iOS is insecure due incorrect security attribute application | secure-store in Expo through 9.1.0 on iOS provides the insecure kSecAttrAccessibleAlwaysThisDeviceOnly policy when WHEN_UNLOCKED_THIS_DEVICE_ONLY is used. | [] | [{'package': {'ecosystem': 'npm', 'name': 'expo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24653'}, {'type': 'WEB', 'url': 'https://github.com/expo/expo/pull/9264'}, {'type': 'WEB', 'url': 'https://github.com/expo/expo/commit/1d82bf07fae2c96273e9189997e521359cffc1a9#diff-5b2820f378da980bd8a8185e2e1b2f9ce085d834534483f29c67932f282cc5c9'},... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T19:40:49Z', 'nvd_published_at': '2020-08-26T05:15:00Z'} |
1.4.0 | GHSA-c4fj-3wqq-g9c9 | 2023-08-02T21:13:03Z | 2022-05-14T00:55:18Z | null | ['CVE-2015-1561'] | Centreon Command Injection | The `escape_command` function in `include/Administration/corePerformance/getStats.php` in Centreon (formerly Merethis Centreon) 2.5.4 and earlier (offending file deleted in Centreon 19.10.0) uses an incorrect regular expression, which allows remote authenticated users to execute arbitrary commands via shell metacharact... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.28'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1561'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/7083'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/7271'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/comm... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T21:07:53Z', 'nvd_published_at': '2015-07-14T16:59:00Z'} |
1.4.0 | GHSA-q9wj-f4qw-6vfj | 2022-06-17T00:09:35Z | 2022-05-24T19:12:03Z | null | ['CVE-2021-3712'] | Read buffer overruns processing ASN.1 strings | ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a str... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3712'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=op... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:09:35Z', 'nvd_published_at': '2021-08-24T15:15:00Z'} |
1.4.0 | GHSA-785h-hrf7-gqxc | 2023-08-02T20:53:09Z | 2022-05-14T03:28:46Z | null | ['CVE-2015-9258'] | Docker Notary Signature Algorithm Not Matched to Key vulnerability | In Docker Notary before 0.1, gotuf/signed/verify.go has a Signature Algorithm Not Matched to Key vulnerability. Because an attacker controls the field specifying the signature algorithm, they might (for example) be able to forge a signature by forcing a misinterpretation of an RSA-PSS key as Ed25519 elliptic-curve data... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/notary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9258'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/notary/blob/master/docs/resources/ncc_docker_notary_audit_2015_07_31.pdf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160305015752/https://docs.docker.com/notary/chan... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T20:53:09Z', 'nvd_published_at': '2018-03-31T21:29:00Z'} |
1.4.0 | GHSA-wj5c-j656-h5fw | 2022-07-01T18:01:00Z | 2022-05-13T01:36:55Z | null | ['CVE-2017-2600'] | Exposure of Sensitive Information to an Unauthorized Actor in Jenkins | In Jenkins before versions 2.44 and 2.32.2, node monitor data could be viewed by low privilege users via the remote API. These included system configuration and runtime information of these nodes (SECURITY-343). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.32.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2600'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/0f92cd08a19207de2cceb6a2f4e3e9f92fdc0899'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2600'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T18:01:00Z', 'nvd_published_at': '2018-05-15T20:29:00Z'} |
1.4.0 | GHSA-rr6r-p7rw-369c | 2022-06-30T16:30:55Z | 2022-05-14T01:04:36Z | null | ['CVE-2018-1000409'] | Session Fixation in Jenkins | A session fixation vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java that prevented Jenkins from invalidating the existing session and creating a new one when a user signed up for a new user account. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.138.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.138.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000409'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-10-10/#SECURITY-1158'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106532'}] | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T16:30:55Z', 'nvd_published_at': '2019-01-09T23:29:00Z'} |
1.4.0 | GHSA-443j-6p7g-6v4w | 2023-07-19T23:24:06Z | 2022-05-24T17:20:25Z | null | ['CVE-2018-16848'] | OpenStack Mistral DoS | A Denial of Service (DoS) condition is possible in OpenStack Mistral in versions up to and including 7.0.3. Submitting a specially crafted workflow definition YAML file containing nested anchors can lead to resource exhaustion culminating in a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mistral'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16848'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/mistral/+bug/1785657'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1645332'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/mistral'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T23:24:06Z', 'nvd_published_at': '2020-06-15T15:15:00Z'} |
1.4.0 | GHSA-mg66-qvc5-rm93 | 2022-05-24T22:08:45Z | 2022-05-24T22:08:45Z | null | ['CVE-2022-29198'] | Missing validation causes denial of service via `SparseTensorToCSRSparseMatrix` | ### Impact
The implementation of [`tf.raw_ops.SparseTensorToCSRSparseMatrix`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/sparse/sparse_tensor_to_csr_sparse_matrix_op.cc#L65-L119) does not fully validate the input arguments. This results in a `CHECK`-fa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mg66-qvc5-rm93'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29198'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ea50a40e84f6bff15a0912728e35b657548cef11'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:08:45Z', 'nvd_published_at': '2022-05-20T22:16:00Z'} |
1.4.0 | GHSA-xrxm-mvqm-r553 | 2023-09-28T20:38:53Z | 2022-05-14T01:33:54Z | null | ['CVE-2019-1000008'] | Helm Path Traversal | All versions of Helm between Helm >=2.0.0 and < 2.12.2 contains a CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The commands `helm fetch --untar` and `helm lint some.tgz` that can result when chart archive files are unpacked a file may be unpacked outside of the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.12.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000008'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://helm.sh/blog/helm-security-notice-2019/index.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:14:08Z', 'nvd_published_at': '2019-02-04T21:29:00Z'} |
1.4.0 | GHSA-xjr9-2wf2-3v4w | 2023-08-16T22:18:14Z | 2022-05-14T02:00:54Z | null | ['CVE-2014-9120'] | Subrion CMS Cross-site scripting in search | A cross-site scripting (XSS) vulnerability in Subrion CMS before 3.2.3 allows remote attackers to inject arbitrary web script or HTML via the `PATH_INFO` to `subrion/search/`. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9120'}, {'type': 'WEB', 'url': 'https://www.netsparker.com/xss-vulnerability-in-subrion-cms/'}, {'type': 'WEB', 'url': 'http://dev.subrion.org/versions/130'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:18:14Z', 'nvd_published_at': '2014-12-10T15:59:00Z'} |
1.4.0 | GHSA-2655-q453-22f9 | 2023-08-29T22:33:16Z | 2022-05-17T05:10:31Z | null | ['CVE-2012-4520'] | Django Allows Arbitrary URL Generation | The `django.http.HttpRequest.get_host` function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3'}, {'fixed': '1.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4520'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T22:33:16Z', 'nvd_published_at': '2012-11-18T23:55:00Z'} |
1.4.0 | GHSA-mcvq-7xjq-46x6 | 2023-01-23T14:37:59Z | 2022-05-17T04:55:27Z | null | ['CVE-2013-7223'] | Fat Free CRM contains Cross-site Request Forgery vulnerablilities | Multiple cross-site request forgery (CSRF) vulnerabilities in Fat Free CRM before 0.12.1 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors, related to the lack of a `protect_from_forgery` line in `app/controllers/application_controller.rb`. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7223'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/issues/300'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/a7fedbb36388bad0c0f32b2346481e0ea126dea6'}, {'type': 'PACKAGE', 'url': 'https://githu... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T14:37:59Z', 'nvd_published_at': '2014-01-02T14:59:00Z'} |
1.4.0 | GHSA-fjj8-gv4j-953p | 2023-07-31T19:06:58Z | 2022-05-14T02:25:02Z | null | ['CVE-2016-0186'] | ChakraCore RCE Vulnerability | The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0191 and CVE-2016-0193. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0186'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d21529b131d831fc4470139bfc90d80ae7481fa2'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-052'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:06:58Z', 'nvd_published_at': '2016-05-11T01:59:00Z'} |
1.4.0 | GHSA-f46p-q6jh-226m | 2022-09-08T22:31:03Z | 2022-05-24T16:56:46Z | null | ['CVE-2019-10418'] | Incorrect Authorization in Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin | Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin provides a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.fabric8.pipeline:kubernetes-pipeline-arquillian-steps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10418'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-pipeline-plugin/blob/master/arquillian-steps'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-920%20(2)'}, {'type': 'WEB', 'url': 'http... | {'cwe_ids': ['CWE-183', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T22:31:03Z', 'nvd_published_at': '2019-09-25T16:15:00Z'} |
1.4.0 | GHSA-hvxr-2fvv-c3wq | 2023-02-08T18:10:02Z | 2022-05-13T01:07:31Z | null | ['CVE-2017-7543'] | OpenStack Neutron Race Condition vulnerability | A race-condition flaw was discovered in openstack-neutron before 7.2.0-12.1, 8.x before 8.3.0-11.1, 9.x before 9.3.1-2.1, and 10.x before 10.0.2-1.1, where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'neutron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.0-12.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'neutron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.3.0-11.1'}]}]}, {'package': {'ecosy... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7543'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2447'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2448'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2449'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:10:02Z', 'nvd_published_at': '2018-07-26T14:29:00Z'} |
1.4.0 | GHSA-v882-949x-6v28 | 2023-07-26T21:48:04Z | 2022-05-14T01:04:04Z | null | ['CVE-2017-12872'] | SimpleSAMLphp allows timing side-channel attacks | The (1) Htpasswd authentication source in the authcrypt module and (2) SimpleSAML_Session class in SimpleSAMLphp 1.14.11 and earlier allow remote attackers to conduct timing side-channel attacks by leveraging use of the standard comparison operator to compare secret material against user input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/simplesamlphp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.0-rc1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12872'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp/commit/b72c79e3070f930d758f5c269333d63ed7509e2e'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T21:48:04Z', 'nvd_published_at': '2017-09-01T21:29:00Z'} |
1.4.0 | GHSA-5c66-6h6g-6q6m | 2022-07-07T23:14:08Z | 2022-05-13T01:12:18Z | null | ['CVE-2013-7398'] | Insufficient Verification of Data Authenticity in Async Http Client | main/java/com/ning/http/client/AsyncHttpClientConfig.java in Async Http Client (aka AHC or async-http-client) before 1.9.0 does not require a hostname match during verification of X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.ning:async-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7398'}, {'type': 'WEB', 'url': 'https://github.com/AsyncHttpClient/async-http-client/issues/197'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E... | {'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:14:08Z', 'nvd_published_at': '2015-06-24T16:59:00Z'} |
1.4.0 | GHSA-4f79-fxh8-vgq2 | 2023-07-21T20:18:10Z | 2022-05-13T01:20:46Z | null | ['CVE-2018-8288'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8288'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5444'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f9b1cded66314c52ab2de8e4e68efb854bd6b9aa'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:18:10Z', 'nvd_published_at': '2018-07-11T00:29:00Z'} |
1.4.0 | GHSA-m246-pv28-4r6f | 2023-07-25T20:07:58Z | 2022-05-14T02:00:08Z | null | ['CVE-2018-17366'] | Mingsoft MCMS CSRF vulnerability | An issue was discovered in MCMS 4.6.5. There is a CSRF vulnerability that can add an administrator account via ms/basic/manager/save.do. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17366'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/IM1DA'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T20:07:58Z', 'nvd_published_at': '2018-09-23T18:29:00Z'} |
1.4.0 | GHSA-xrh2-c3rm-35jr | 2022-11-22T18:45:47Z | 2022-05-24T22:01:08Z | null | ['CVE-2014-3599'] | HornetQ REST vulnerable to Improper Restriction of XML External Entity Reference | HornetQ REST is vulnerable to XML External Entity due to insecure configuration of RestEasy. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.hornetq.rest:hornetq-rest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0.Beta1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3599'}, {'type': 'WEB', 'url': 'https://github.com/hornetq/hornetq/commit/b3a63576371828d5f8e64ba7ccbcecb1da8111d2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2014-3599'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.co... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:45:47Z', 'nvd_published_at': '2019-11-12T14:15:00Z'} |
1.4.0 | GHSA-588w-w6mv-3cw5 | 2023-02-08T18:09:23Z | 2022-05-13T01:06:04Z | null | ['CVE-2017-7550'] | Ansible Insertion of Sensitive Information into Log File vulnerability | A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords to be specified in the "params" argument,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7550'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/30874'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2966'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2017-7550'}, {'type': '... | {'cwe_ids': ['CWE-532'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:09:23Z', 'nvd_published_at': '2017-11-21T17:29:00Z'} |
1.4.0 | GHSA-jhm7-38xj-pvm8 | 2023-02-07T18:24:03Z | 2022-05-17T05:45:48Z | null | ['CVE-2010-2235'] | Cobbler is vulnerable to code injection | template_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticated administrators to execute arbitrary code via a crafted kickstart tem... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-2235'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2010:0775'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2010-2235'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=607662'}, {'type'... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T18:24:03Z', 'nvd_published_at': '2010-12-09T20:00:00Z'} |
1.4.0 | GHSA-29mr-gr4c-vf9c | 2023-09-26T18:53:44Z | 2022-05-24T17:00:25Z | null | ['CVE-2019-8115'] | Magento 2 Community Edition XSS Vulnerability | A reflected cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can inject arbitrary JavaScript code when adding an image for during simple product creation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8115'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:50:53Z', 'nvd_published_at': '2019-11-05T23:15:00Z'} |
1.4.0 | GHSA-hw6x-2qwv-rxr7 | 2022-06-28T22:28:13Z | 2022-05-24T16:55:58Z | null | ['CVE-2019-10392'] | Improper Neutralization of Special Elements used in an OS Command in Jenkins Git Client Plugin | Jenkins Git Client Plugin 2.8.4 and earlier did not properly restrict values passed as URL argument to an invocation of 'git ls-remote', resulting in OS command injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10392'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1534'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/12/2'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:28:13Z', 'nvd_published_at': '2019-09-12T14:15:00Z'} |
1.4.0 | GHSA-fv87-p7qr-xh5x | 2023-09-28T20:24:02Z | 2022-05-13T01:21:40Z | null | ['CVE-2019-0860'] | ChakraCore Memory Corruption Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0806, CVE-2019-0810, CVE-2019-0812, CVE-2019-0829, CVE-2019-0861. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0860'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6087'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/9a9ece61b560fe84f451625140bb46d35fb3b045'}, {'type': 'PACKAGE', 'url': 'https://github.c... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T19:05:29Z', 'nvd_published_at': '2019-04-09T21:29:00Z'} |
1.4.0 | GHSA-6364-jx4h-7564 | 2022-12-15T16:53:53Z | 2022-05-24T17:45:46Z | null | ['CVE-2021-21637'] | Missing permission check in Jenkins Team Foundation Server Plugin allow capturing credentials | A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:tfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.157.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21637'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/tfs-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2... | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T16:53:53Z', 'nvd_published_at': '2021-03-30T12:16:00Z'} |
1.4.0 | GHSA-gqqf-8cx6-9r7h | 2023-07-13T17:15:15Z | 2022-05-24T17:07:13Z | null | ['CVE-2020-7210'] | Umbraco CMS vulnerable to CSRF | Umbraco CMS 8.2.2 allows CSRF to enable/disable or delete user accounts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoCMS.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7210'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}, {'type': 'WEB', 'url': 'https://sec-consult.com/en/blog/advisories/cross-site-request-forgery-csrf-in-umbraco-cms/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:15:15Z', 'nvd_published_at': '2020-01-23T13:15:00Z'} |
1.4.0 | GHSA-qpg2-vx7j-3869 | 2022-06-27T16:52:31Z | 2022-05-24T22:00:57Z | null | ['CVE-2019-17626'] | XML Injection in ReportLab | ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'reportlab'}, 'ecosystem_specific': {'affected_functions': ['reportlab.lib.colors.toColor.__call__']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.28'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17626'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0195'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0197'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0201'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-91'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T16:52:31Z', 'nvd_published_at': '2019-10-16T12:15:00Z'} |
1.4.0 | GHSA-4c93-q79v-mw45 | 2023-07-21T20:30:53Z | 2022-05-13T01:20:55Z | null | ['CVE-2018-8466'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8367, CVE-2018-8465, CVE-2018-8467. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8466'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5688'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/a404dec6506962d9a608ca9642b0aab147a0f8d1'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:30:53Z', 'nvd_published_at': '2018-09-13T00:29:00Z'} |
1.4.0 | GHSA-mjg2-326q-49f9 | 2023-07-21T19:21:11Z | 2022-05-13T01:20:58Z | null | ['CVE-2018-8551'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8551'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5827'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6199b5e19a61744f5d2357bbbaf1b50dd284c4a6'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:21:11Z', 'nvd_published_at': '2018-11-14T01:29:00Z'} |
1.4.0 | GHSA-36hp-4x3g-phrg | 2023-09-22T21:05:24Z | 2022-05-01T18:13:15Z | null | ['CVE-2007-3384'] | Apache Tomcat's CookieExample Vulnerable to XSS | Multiple cross-site scripting (XSS) vulnerabilities in `examples/servlet/CookieExample` in Apache Tomcat 3.3 through 3.3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) Name or (2) Value field, related to error messages. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'last_affected': '3.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-3384'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20070824135030/http://securityreason.com/securityalert/2971'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20071117100258/http://securitytracker.com/alerts/2007/Aug/1018503.html'},... | {'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:05:24Z', 'nvd_published_at': '2007-08-08T01:17:00Z'} |
1.4.0 | GHSA-cr6r-6xm9-ww22 | 2023-08-28T23:18:09Z | 2022-05-14T01:33:07Z | null | ['CVE-2018-20745'] | Yii Incorrectly Implements CORS | Yii 2.x through 2.0.15.1 actively converts a wildcard CORS policy into reflecting an arbitrary Origin header value, which is incompatible with the CORS security design, and could lead to CORS misconfiguration security problems. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20745'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/issues/16193'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/pull/16198'}, {'type': 'WEB', 'url': 'https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-che... | {'cwe_ids': ['CWE-346'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:18:09Z', 'nvd_published_at': '2019-01-28T08:29:00Z'} |
1.4.0 | GHSA-99rf-92v6-cwx4 | 2022-07-12T22:16:48Z | 2022-05-17T00:57:35Z | null | ['CVE-2012-5885'] | Improper Access Control in Apache Tomcat | The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote att... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.36'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5885'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/80408'}, {'type': 'WEB', 'url': 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19432'}, {'type': 'WEB', 'url': 'http://lis... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:16:48Z', 'nvd_published_at': '2012-11-17T19:55:00Z'} |
1.4.0 | GHSA-c8c8-9472-w52h | 2023-07-31T18:31:52Z | 2022-05-14T02:46:13Z | null | ['CVE-2016-6186'] | Django XSS Vulnerability | Cross-site scripting (XSS) vulnerability in the `dismissChangeRelatedObjectPopup` function in `contrib/admin/static/admin/js/admin/RelatedObjectLookups.js` in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe u... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9'}, {'fixed': '1.9.8'}]}]}, {'package': {'ecosystem': 'PyPI'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6186'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:31:52Z', 'nvd_published_at': '2016-08-05T15:59:00Z'} |
1.4.0 | GHSA-phcc-frh9-q545 | 2023-07-20T18:01:18Z | 2022-05-13T01:18:38Z | null | ['CVE-2018-0934'] | ChakraCore RCE Vulnerability | ChakraCore and Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0934'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6d0f5de1e0331fd6dd4f1ee0c0032430bcb131c3'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0934'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:01:18Z', 'nvd_published_at': '2018-03-14T17:29:00Z'} |
1.4.0 | GHSA-f8r7-7hv9-7f43 | 2022-12-12T16:34:18Z | 2022-05-14T03:13:13Z | null | ['CVE-2018-1000188'] | Jenkins CAS Plugin Server-Side Request Forgery vulnerability | A server-side request forgery vulnerability exists in Jenkins CAS Plugin 1.4.1 and older in CasSecurityRealm.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL. Additionally, this form validation method did not require POST requests, resulting in a CSRF vulnera... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cas-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000188'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cas-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-04/#SECURITY-809'}] | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:34:18Z', 'nvd_published_at': '2018-06-05T20:29:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.