schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-62fp-j75q-mqhc
2022-12-06T21:25:51Z
2022-05-24T16:58:48Z
null
['CVE-2019-10437']
Jenkins CRX Content Package Deployer Plugin subject to Cross-Site Request Forgery
A cross-site request forgery vulnerability in Jenkins CRX Content Package Deployer Plugin prior to 1.9 allowed attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. This issue is patched in version 1.9
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:crx-content-package-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10437'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/crx-content-package-deployer-plugin/commit/1313c422170a064dab0f9359324ff27e30a9f4a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/crx-content-package-deployer-plugin/'}, {'...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:25:51Z', 'nvd_published_at': '2019-10-16T14:15:00Z'}
1.4.0
GHSA-2cvf-r9jm-4qm9
2023-07-19T20:01:06Z
2022-05-13T01:14:22Z
null
['CVE-2019-3830']
Ceilometer Prints Sensitive Configuration Data to Log
A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ceilometer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0.0rc1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3830'}, {'type': 'WEB', 'url': 'https://github.com/openstack/ceilometer/commit/8881a42af169a2d7c912b1434911f978883c83f3'}, {'type': 'WEB', 'url': 'https://github.com/openstack/ceilometer/commit/8881a42af169a2d7c912b1434911f978883c83f3#diff-f2d22735...
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T20:01:06Z', 'nvd_published_at': '2019-03-26T18:29:00Z'}
1.4.0
GHSA-qv6f-rcv6-6q3x
2022-12-13T15:03:32Z
2022-05-24T17:39:12Z
null
['CVE-2021-21604']
Improper handling of REST API XML deserialization errors in Jenkins
Jenkins provides XML REST APIs to configure views, jobs, and other items. When deserialization fails because of invalid data, Jenkins 2.274 and earlier, LTS 2.263.1 and earlier stores invalid object references created through these endpoints in the Old Data Monitor. If an administrator discards the old data, some erron...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.263.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.263.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21604'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-1923'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:51:53Z', 'nvd_published_at': '2021-01-13T16:15:00Z'}
1.4.0
GHSA-69wp-3pm3-hxgg
2022-11-04T22:36:16Z
2022-05-24T17:13:14Z
null
['CVE-2019-17564']
Deserialization of Untrusted Data in Apache Dubbo
Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo-rpc-http-invoker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17564'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/commit/9b18fe228971eaeca9b87d7b7e95df1c2a8ff91b'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4275'}, {'type': 'WEB', 'url': 'https://github.com/apache/du...
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T22:36:16Z', 'nvd_published_at': '2020-04-01T22:15:00Z'}
1.4.0
GHSA-6565-fg86-6jcx
2023-08-04T23:14:41Z
2022-05-17T03:34:12Z
null
['CVE-2015-2241']
Django Cross-site Scripting Vulnerability
Cross-site scripting (XSS) vulnerability in the contents function in `admin/helpers.py` in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in `ModelAdmin.readonly_fields`, as demonstrated by an `@property`.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8a1'}, {'f...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2241'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2654e1b93923bac55f12b4e66c5e39b16695ace5'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/82c9169077a066995e3b00aac551bf1c8a89d98a'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T23:14:41Z', 'nvd_published_at': '2015-03-12T14:59:00Z'}
1.4.0
GHSA-fm53-mpmp-7qw2
2022-05-25T22:55:25Z
2022-05-25T22:55:25Z
null
['CVE-2022-30999']
Possible cross-site scripting attack via unsanitized SVG files in FoF Upload
### Impact If FoF Upload is configured to allow the uploading of SVG files (`image/svg+xml`), navigating directly to an SVG file URI could execute arbitrary Javascript code decided by an attacker. This Javascript code could include the execution of HTTP web requests to Flarum, or any other web service. This could allo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'fof/upload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfFlarum/upload/security/advisories/GHSA-fm53-mpmp-7qw2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30999'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfFlarum/upload/issues/68'}, {'type': 'WEB', 'url': 'https://github.com/FriendsO...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:55:25Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-6xw9-qq9h-cr68
2022-12-06T21:44:47Z
2022-05-24T16:59:38Z
null
['CVE-2019-10461']
Jenkins Dynatrace Plugin vulnerable to Insufficiently Protected Credentials
Jenkins Dynatrace Application Monitoring Plugin prior to 2.1.4 stores credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. ##NOTE: This plugin is marked as DEPRECATED
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dynatrace-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10461'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dynatrace-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1477'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/...
{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:44:47Z', 'nvd_published_at': '2019-10-23T13:15:00Z'}
1.4.0
GHSA-p84x-5xx8-hff9
2023-09-26T20:02:48Z
2022-05-24T22:01:17Z
null
['CVE-2019-19729']
bson-objectid contains Improper input validation
An issue was discovered in the BSON ObjectID (aka bson-objectid) package 1.3.0 for Node.js. ObjectID() allows an attacker to generate a malformed objectid by inserting an additional property to the user-input, because bson-objectid will return early if it `detects _bsontype==ObjectID` in the user-input object. As a res...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bson-objectid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19729'}, {'type': 'WEB', 'url': 'https://github.com/williamkapke/bson-objectid/issues/30'}, {'type': 'PACKAGE', 'url': 'https://github.com/cabinjs/bson-objectid'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/bson-objectid'}]
{'cwe_ids': ['CWE-20', 'CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T21:09:18Z', 'nvd_published_at': '2019-12-11T20:15:00Z'}
1.4.0
GHSA-5xp2-rv4h-mm2q
2023-08-01T23:29:14Z
2022-05-24T16:48:40Z
null
['CVE-2019-10133']
Moodle Open Redirect Vulnerability
A flaw was found in Moodle before 3.7, 3.6.4, 3.5.6, 3.4.9 and 3.1.18. The form to upload cohorts contained a redirect field, which was not restricted to internal URLs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.6.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECO...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10133'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/c509d108216524887c7ca08b1c451054d669ea75'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10133'}, {'type': 'WEB', 'url': 'https://moodle.org/mo...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:29:14Z', 'nvd_published_at': '2019-06-26T19:15:00Z'}
1.4.0
GHSA-xhfc-gr8f-ffwc
2022-07-07T23:26:16Z
2022-05-24T16:45:53Z
null
['CVE-2019-0980']
Denial of service in ASP.NET Core
A denial of service vulnerability exists when .NET Framework or .NET Core improperly handle web requests, aka '.Net Framework and .Net Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0820, CVE-2019-0981.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'System.Private.Uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0980'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/112'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidanc...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:26:16Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}
1.4.0
GHSA-wm7h-9275-46v2
2023-08-28T14:22:54Z
2022-05-21T00:00:25Z
null
['CVE-2022-24434']
Crash in HeaderParser in dicer
This affects all versions of the package `dicer`. A malicious attacker can send a modified form to the server and crash the Node.js service. A complete denial of service can be achieved by sending the malicious form in a loop.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'dicer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:dicer'}, 'ecosystem_specific': {'affected_functions': ['']}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24434'}, {'type': 'WEB', 'url': 'https://github.com/mscdex/busboy/issues/250'}, {'type': 'WEB', 'url': 'https://github.com/mscdex/dicer/pull/22'}, {'type': 'WEB', 'url': 'https://github.com/mscdex/dicer/commit/b7fca2e93e8e9d4439d8acc5c02f5e54a0112d...
{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:22:41Z', 'nvd_published_at': '2022-05-20T20:15:00Z'}
1.4.0
GHSA-vgxq-xv7f-jxjx
2023-07-21T22:03:38Z
2022-05-13T01:20:46Z
null
['CVE-2018-8290']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8280, CVE-2018-8286, CVE-2018-8294.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8290'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5444'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/8bd6826aea01ff1af36f2a83fe00c44799ba80cb'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:03:38Z', 'nvd_published_at': '2018-07-11T00:29:00Z'}
1.4.0
GHSA-254j-mmc5-qhpx
2023-01-27T00:53:50Z
2022-05-24T19:06:56Z
null
['CVE-2021-35440']
Smashing Cross-site Scripting vulnerability
Smashing 1.3.4 is vulnerable to Cross Site Scripting (XSS). A URL for a widget can be crafted and used to execute JavaScript on the victim's computer. The JavaScript code can then steal data available in the session/cookies depending on the user environment (e.g. if re-using internal URL's for deploying, or cookies tha...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'smashing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35440'}, {'type': 'WEB', 'url': 'https://github.com/Smashing/smashing/pull/186'}, {'type': 'WEB', 'url': 'https://github.com/Smashing/smashing/pull/186/commits/f4648137ae77aa2a9ccd14b2e6eeaed2cfb32da3'}, {'type': 'PACKAGE', 'url': 'https://github.c...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:53:50Z', 'nvd_published_at': '2021-07-06T15:15:00Z'}
1.4.0
GHSA-h8v5-p258-pqf4
2022-05-24T12:47:10Z
2022-05-24T12:47:10Z
null
['CVE-2022-29161']
Use of a Broken or Risky Cryptographic Algorithm in XWiki Crypto API
### Impact XWiki Crypto API will generate X509 certificates signed by default using SHA1 with RSA, which is not considered safe anymore for use in certificate signatures, due to the risk of collisions with SHA1. Note that this API is never used in XWiki Standard but it might be used in some extensions of XWiki. ### Pa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introd...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h8v5-p258-pqf4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29161'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/26728f3f23658288683667a5182a916c7ecefc52'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-326', 'CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T12:47:10Z', 'nvd_published_at': '2022-05-06T00:15:00Z'}
1.4.0
GHSA-2w4h-f44w-968f
2022-06-21T20:12:33Z
2022-05-24T19:09:23Z
null
['CVE-2021-34802']
Improper Privilege Management in Neo4j Graph Database
A failure in resetting the security context in some transaction actions in Neo4j Graph Database 4.2 could allow authenticated users to execute commands with elevated privileges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j:neo4j-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34802'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j/neo4j'}, {'type': 'WEB', 'url': 'https://neo4j.com'}, {'type': 'WEB', 'url': 'https://neo4j.com/developer/kb/neo4j-4-2-x-sec-vuln-fix/'}]
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:12:33Z', 'nvd_published_at': '2021-07-30T14:15:00Z'}
1.4.0
GHSA-wq2p-q66w-q8gp
2023-08-17T23:32:20Z
2022-05-14T01:10:35Z
null
['CVE-2013-4322']
Apache Tomcat Denial of Service vulnerability
Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by stream...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4322'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1069905'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=e...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T23:32:20Z', 'nvd_published_at': '2014-02-26T14:55:00Z'}
1.4.0
GHSA-w47p-5q88-hj5g
2022-11-03T19:13:38Z
2022-05-17T03:56:49Z
null
['CVE-2016-0709']
Path Traversal in Apache Jetspeed
Directory traversal vulnerability in the Import/Export function in the Portal Site Manager in Apache Jetspeed before 2.3.1 allows remote authenticated administrators to write to arbitrary files, and consequently execute arbitrary code, via a .. (dot dot) in a ZIP archive entry, as demonstrated by "../../webapps/x.jsp."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.jetspeed-2:jetspeed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0709'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/portals-jetspeed-user/201603.mbox/%3C281D02D0-6A03-4421-9D86-E73B001C8677@bluesunrise.com%3E'}, {'type': 'WEB', 'url': 'https://portals.apache.org/jetspeed-2/security-reports...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:13:38Z', 'nvd_published_at': '2016-04-11T14:59:00Z'}
1.4.0
GHSA-rvww-w62m-hch8
2023-01-05T21:26:43Z
2022-05-24T17:29:16Z
null
['CVE-2020-2281']
CSRF vulnerability in Jenkins Lockable Resources Plugin
Lockable Resources Plugin 2.8 and earlier does not require POST requests for several HTTP endpoints, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to reserve, unreserve, unlock, and reset resources. Lockable Resources Plugin 2.9 requires POST requests for the affect...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.6wind.jenkins:lockable-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2281'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/lockable-resources-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-1958'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T21:26:43Z', 'nvd_published_at': '2020-09-23T14:15:00Z'}
1.4.0
GHSA-69q7-hww4-8pjq
2023-07-13T17:08:08Z
2022-05-24T17:06:46Z
null
['CVE-2020-5502']
phpBB allows CSRF
phpBB 3.2.8 allows a CSRF attack that can approve pending group memberships.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpbb/phpbb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.8'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5502'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpbb/phpbb'}, {'type': 'WEB', 'url': 'https://www.phpbb.com/community/viewtopic.php?f=14&t=2534536'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:08:08Z', 'nvd_published_at': '2020-01-15T00:15:00Z'}
1.4.0
GHSA-vjf9-8wqg-xc7r
2023-07-21T20:20:31Z
2022-05-13T01:20:56Z
null
['CVE-2018-8510']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8503, CVE-2018-8505, CVE-2018-8511, CVE-2018-8...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8510'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5764'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/9b36ce832c9a81bb51e3b1a39067feadcd1e14d2'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:20:31Z', 'nvd_published_at': '2018-10-10T13:29:00Z'}
1.4.0
GHSA-jh3j-xfv2-f9m9
2023-09-26T20:40:08Z
2022-05-24T17:11:33Z
null
['CVE-2019-19209']
Dolibarr ERP and CRM SQLi
Dolibarr ERP/CRM before 10.0.3 allows SQL Injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19209'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/security-advisories/usd-2019-0051/'}, {'type': 'WEB', 'url': 'https://www.dolibarr.org/forum/dolibarr-changelogs'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T23:45:02Z', 'nvd_published_at': '2020-03-16T15:15:00Z'}
1.4.0
GHSA-g466-57gh-cqfw
2023-01-27T00:09:31Z
2022-05-17T05:30:58Z
null
['CVE-2008-7311']
Spree uses a hardcoded hash value
The session cookie store implementation in Spree 0.2.0 uses a hardcoded `config.action_controller_session` hash value (aka secret key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging an application that contains this value within the `config/environment.rb` file.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-7311'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2008-7311.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree'}, {'type': 'WEB', 'url': 'https://spreecommerce.com/blog/security-vu...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:09:31Z', 'nvd_published_at': '2012-04-05T13:25:00Z'}
1.4.0
GHSA-wx54-3278-m5g4
2022-06-02T22:17:28Z
2022-05-20T00:00:38Z
null
['CVE-2022-22976']
Integer overflow in BCrypt class in Spring Security
Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not aff...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'ev...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22976'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220707-0003/'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22976'...
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:21:14Z', 'nvd_published_at': '2022-05-19T15:15:00Z'}
1.4.0
GHSA-v4vm-gj2x-6qhm
2023-08-15T22:34:06Z
2022-05-17T19:57:24Z
null
['CVE-2014-8328']
DCE extension for Typo3 Discloses Environment Information
The default configuration in the Dynamic Content Elements (dce) extension before 0.11.5 for TYPO3 allows remote attackers to obtain sensitive installation environment information by reading the update check request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 't3/dce'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8328'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/97673'}, {'type': 'PACKAGE', 'url': 'https://github.com/a-r-m-i-n/dce'}, {'type': 'WEB', 'url': 'http://typo3.org/extensions/repository/view/dce'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T22:34:06Z', 'nvd_published_at': '2020-02-03T14:15:00Z'}
1.4.0
GHSA-jjq8-vfjq-j6v4
2022-07-06T20:11:51Z
2022-05-14T02:48:01Z
null
['CVE-2015-5531']
Improper Limitation of a Pathname to a Restricted Directory in Elasticsearch
Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5531'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/38383/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/132721/Elasticsearch-Directory-Traversa...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:11:51Z', 'nvd_published_at': '2015-08-17T15:59:00Z'}
1.4.0
GHSA-h8wp-wgcq-qhrf
2022-07-06T20:04:55Z
2022-05-24T17:04:48Z
null
['CVE-2016-1000229']
Improper Neutralization of Input During Web Page Generation in swagger-ui
swagger-ui has XSS in key names
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000229'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0868'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000229'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:04:55Z', 'nvd_published_at': '2019-12-20T14:15:00Z'}
1.4.0
GHSA-2c79-h2h5-g3fw
2022-12-16T20:33:58Z
2022-05-24T19:19:44Z
null
['CVE-2021-21691']
Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins
The agent-to-controller security subsystem limits which files on the Jenkins controller can be accessed by agent processes. Multiple vulnerabilities in the file path filtering implementation of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allow agent processes to read and write arbitrary files on the Jenkins con...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.303.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.303.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21691'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455'}]
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:48:06Z', 'nvd_published_at': '2021-11-04T17:15:00Z'}
1.4.0
GHSA-8qh4-fghr-6fxg
2022-06-28T16:02:05Z
2022-05-24T16:58:49Z
null
['CVE-2019-10436']
Improper Limitation of a Pathname to a Restricted Directory in Jenkins Google OAuth Credentials Plugin
An arbitrary file read vulnerability in Jenkins Google OAuth Credentials Plugin 0.9 and earlier allowed attackers able to configure jobs and credentials in Jenkins to obtain the contents of any file on the Jenkins master.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-oauth-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10436'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/google-oauth-plugin/commit/aef26a8425e515a9986412000d6191db95fa9e56'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-oauth-plugin'}, {'type': 'WEB', 'url': 'https://jen...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T16:02:05Z', 'nvd_published_at': '2019-10-16T14:15:00Z'}
1.4.0
GHSA-44hv-jjx7-qfjg
2022-11-03T22:48:46Z
2022-05-14T00:54:13Z
null
['CVE-2016-6795']
Path Traversal in Apache Struts
In Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side. This vulnerability is only exploitable when using the Struts 2 Convention plugin in conjunction with Apache Struts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6795'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180629-0003/'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-042.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/93773'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:48:46Z', 'nvd_published_at': '2017-09-20T17:29:00Z'}
1.4.0
GHSA-2f4c-8rp6-fh6q
2022-12-28T22:47:35Z
2022-05-24T17:28:27Z
null
['CVE-2020-2275']
Arbitrary file read vulnerability in Copy data to workspace Jenkins Plugin
Jenkins Copy data to workspace Plugin 1.0 and earlier does not limit which directories can be copied from the Jenkins controller to job workspaces, allowing attackers with Job/Configure permission to read arbitrary files on the Jenkins controller.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:copy-data-to-workspace-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2275'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/copy-data-to-workspace-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1966'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/os...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T22:47:35Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-fg9w-cffm-pmh2
2022-07-01T17:02:04Z
2022-05-13T01:45:59Z
null
['CVE-2017-4971']
Insecure Default Initialization of Resource in Pivotal Spring Web Flow
An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not hav...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.webflow:spring-webflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-4971'}, {'type': 'WEB', 'url': 'https://jira.spring.io/browse/SWF-1700'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2017-4971'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98785'}]
{'cwe_ids': ['CWE-1188'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:02:04Z', 'nvd_published_at': '2017-06-13T06:29:00Z'}
1.4.0
GHSA-ph3w-2843-72mx
2022-06-02T20:36:41Z
2022-05-30T00:00:30Z
null
['CVE-2022-1928']
Stored Cross-site Scripting in gitea
Cross-site Scripting (XSS) - Stored in GitHub repository go-gitea/gitea prior to 1.16.9 via unfiltered pdfs
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1928'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/19825'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/commit/65e0688a5c9dacad50e71024b7529fdf0e3c2e9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/git...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:36:41Z', 'nvd_published_at': '2022-05-29T14:15:00Z'}
1.4.0
GHSA-xmvg-c4x3-9qwp
2023-07-21T17:44:24Z
2022-05-13T01:18:41Z
null
['CVE-2018-0980']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0990, CVE-2018-0993, CVE-2018-0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0980'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/af07d28d486843bbd1fdefe742a9c090026b32ee'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0980'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T17:44:24Z', 'nvd_published_at': '2018-04-12T01:29:00Z'}
1.4.0
GHSA-2wf5-4mf7-vmh3
2022-12-21T19:37:09Z
2022-05-24T17:33:07Z
null
['CVE-2020-2303']
CSRF vulnerability in Jenkins Active Directory Plugin
Active Directory Plugin 2.19 and earlier does not require POST requests for multiple HTTP endpoints implementing connection and authentication tests, resulting in cross-site request forgery (CSRF) vulnerabilities. This vulnerability allows attackers to perform connection tests, connecting to attacker-specified or prev...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:active-directory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2303'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/active-directory-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2126'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T19:36:47Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-rx7j-mw4c-76g9
2023-01-26T23:55:17Z
2022-05-14T00:54:20Z
null
['CVE-2012-6497']
Authlogic Information Exposure vulnerability
The Authlogic gem for Ruby on Rails prior to version 3.3.0 makes potentially unsafe `find_by_id` method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL injection attacks via a crafted parameter in environments that have a known secret_token value, as demonstrated by a value contained in `secret_t...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'authlogic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6497'}, {'type': 'WEB', 'url': 'https://github.com/binarylogic/authlogic/pull/341'}, {'type': 'WEB', 'url': 'https://github.com/binarylogic/authlogic/commit/1d57a6c4abe43a3c0b4ef578486ea00e1f7a9873'}, {'type': 'PACKAGE', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:55:17Z', 'nvd_published_at': '2013-01-04T04:46:00Z'}
1.4.0
GHSA-46p2-fwqg-3h6m
2022-06-30T18:52:28Z
2022-05-13T01:48:31Z
null
['CVE-2018-1000110']
Incorrect Authorization in Jenkins Git Plugin
An improper authorization vulnerability exists in Jenkins Git Plugin version 3.7.0 and earlier in GitStatus.java that allows an attacker with network access to obtain a list of nodes and users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.7.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000110'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/git-plugin/commit/a3d3a7eb7f75bfe97a0291e3b6d074aafafa86c9'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security...
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T18:52:28Z', 'nvd_published_at': '2018-03-13T13:29:00Z'}
1.4.0
GHSA-j696-6m57-mcrv
2023-07-27T00:42:17Z
2022-05-17T00:29:00Z
null
['CVE-2017-14498']
Silverstripe CMS XSS Vulnerability
SilverStripe CMS before 3.6.1 has XSS via an SVG document that is mishandled by (1) the Insert Media option in the content editor or (2) an admin/assets/add pathname, as demonstrated by the admin/pages/edit/EditorToolbar/MediaForm/field/AssetUploadField/upload URI, aka issue SS-2017-017.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14498'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/commit/25b77a2ff8deabe8e8894002b9a5647eaec27b0a'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-installer/commit/c25478bef75cc5482852e80...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T00:42:17Z', 'nvd_published_at': '2017-09-15T18:29:00Z'}
1.4.0
GHSA-f4w6-3rh6-6q4q
2023-07-18T22:01:34Z
2022-05-24T17:02:42Z
null
['CVE-2019-11255']
Kubernetes CSI Sidecar Containers Can Allow Unauthorized Data Access
Improper input validation in Kubernetes CSI sidecar containers for external-provisioner (<v0.4.3, <v1.0.2, v1.1, <v1.2.2, <v1.3.1), external-snapshotter (<v0.4.2, <v1.0.2, v1.1, <1.2.2), and external-resizer (v0.1, v0.2) could result in unauthorized PersistentVolume data access or volume mutation during snapshot, resto...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes-csi/external-provisioner'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes-csi/external-provisioner...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11255'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/85233'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4054'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4096'}, {'type':...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:01:34Z', 'nvd_published_at': '2019-12-05T16:15:00Z'}
1.4.0
GHSA-mw6j-hh29-h379
2022-05-25T19:33:50Z
2022-05-25T19:33:50Z
null
[]
`CHECK` failure in depthwise ops via overflows
### Impact The implementation of depthwise ops in TensorFlow is vulnerable to a denial of service via `CHECK`-failure (assertion failure) caused by overflowing the number of elements in a tensor: ```python import tensorflow as tf input = tf.constant(1, shape=[1, 4, 4, 3], dtype=tf.float32) filter_sizes = tf.constant(...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mw6j-hh29-h379'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3796cc4fcd93ae55812a457abc96dcd55fbb854b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:33:50Z', 'nvd_published_at': None}
1.4.0
GHSA-6g57-h38c-q52g
2022-06-29T15:49:32Z
2022-05-14T01:29:12Z
null
['CVE-2018-8718']
Cross-Site Request Forgery in Jenkins Mailer Plugin
Cross-site request forgery (CSRF) vulnerability in the Mailer Plugin 1.20 for Jenkins 2.111 allows remote authenticated users to send unauthorized mail as an arbitrary user via a /descriptorByName/hudson.tasks.Mailer/sendTestMail request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.20'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8718'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/44843/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2018/03/26/3'}, {'type': 'W...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T15:49:32Z', 'nvd_published_at': '2018-03-27T16:29:00Z'}
1.4.0
GHSA-x68x-wvm2-hqc8
2022-12-20T22:42:08Z
2022-05-24T17:19:04Z
null
['CVE-2020-2195']
Stored XSS vulnerability in Jenkins Compact Columns Plugin
Compact Columns Plugin 1.11 and earlier displays the unprocessed job description in tooltips. This results in a stored cross-site scripting vulnerability that can be exploited by users with Job/Configure permission. Compact Columns Plugin 1.12 applies the configured markup formatter to the job description shown in to...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:compact-columns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2195'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compact-columns-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1837'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:42:08Z', 'nvd_published_at': '2020-06-03T13:15:00Z'}
1.4.0
GHSA-qcqr-hcjq-whfq
2022-07-12T22:14:44Z
2022-05-17T00:15:12Z
null
['CVE-2016-4993']
Improper Neutralization of CRLF Sequences in Wildfly Undertow
CRLF injection vulnerability in the Undertow web server in WildFly 10.0.0, as used in Red Hat JBoss Enterprise Application Platform (EAP) 7.x before 7.0.2, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-undertow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0.Final'}, {'fixed': '11.0.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.1.0.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4993'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/834496fb74ddda2af197940c70d08bab419fdf12'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3454'}, {'type': 'WEB', 'url': 'https://access.redhat.com/...
{'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:14:44Z', 'nvd_published_at': '2016-09-26T14:59:00Z'}
1.4.0
GHSA-5957-5crx-79jx
2023-08-01T21:29:03Z
2022-05-24T17:07:24Z
null
['CVE-2015-3154']
Zenario CMS vulnerable to CRLF injection
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'f...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3154'}, {'type': 'WEB', 'url': 'http://framework.zend.com/security/advisory/ZF2015-04'}]
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T21:29:03Z', 'nvd_published_at': '2020-01-27T16:15:00Z'}
1.4.0
GHSA-v4f8-2847-rwm7
2023-07-10T13:02:34Z
2022-05-24T19:02:44Z
null
['CVE-2021-3518']
Nokogiri Implements libxml2 version vulnerable to use-after-free
There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3518'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1954242'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-3518.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T21:16:34Z', 'nvd_published_at': '2021-05-18T12:15:00Z'}
1.4.0
GHSA-j7h6-xr7g-m2c5
2023-08-16T09:36:55Z
2022-05-17T03:28:23Z
null
['CVE-2013-4316']
Code injection in Apache Struts
Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4316'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html'}, {'type': 'WEB', 'url': 'http://struts.apache.org/release/2.3.x/docs/s2-019.html'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:43:48Z', 'nvd_published_at': '2013-09-30T21:55:00Z'}
1.4.0
GHSA-8x3m-m3x9-54fj
2022-09-12T16:17:03Z
2022-05-13T01:12:09Z
null
['CVE-2018-7206']
JupyterHub OAuthenticator elevation of privilege
An issue was discovered in Project Jupyter JupyterHub OAuthenticator 0.6.x before 0.6.2 and 0.7.x before 0.7.3. When using JupyterHub with GitLab group whitelisting for access control, group membership was not checked correctly, allowing members not in the whitelisted groups to create accounts on the Hub. (Users were n...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'oauthenticator'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6'}, {'fixed': '0.6.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'oauthenticator'}, 'ecosystem_specific': {'affected_functions': ['']}, 'r...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7206'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/oauthenticator/commit/1845c0e4b1bff3462c91c3108c85205acd3c75a2'}, {'type': 'WEB', 'url': 'https://blog.jupyter.org/security-fix-for-jupyterhub-gitlab-oauthenticator-7b14571d1f76'}, {'typ...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T16:17:03Z', 'nvd_published_at': '2018-02-18T03:29:00Z'}
1.4.0
GHSA-3xjq-8j89-xrw9
2022-12-12T16:32:16Z
2022-05-14T03:05:27Z
null
['CVE-2018-1000604']
Jenkins Badge Plugin cross-site scripting vulnerability
A persisted cross-site scripting vulnerability exists in Jenkins Badge Plugin 1.4 and earlier in BadgeSummaryAction.java, HtmlBadgeAction.java that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions. Ba...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:badge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000604'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/badge-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-25/#SECURITY-906'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:32:16Z', 'nvd_published_at': '2018-06-26T17:29:00Z'}
1.4.0
GHSA-85vg-grr5-pw42
2022-05-18T19:29:59Z
2022-05-04T00:00:22Z
null
['CVE-2021-46440']
Insecure password handling vulnerability in Strapi
Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request. From this, the attacker can get the victim's cookie, base64 decode it, and obtain a cleartext password, leading to getting API documentation f...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.9'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@strapi/strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46440'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/12246'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://hub.docker.com/r/strapi/strapi'}, {'type': 'WEB', 'url': 'https://strapi...
{'cwe_ids': ['CWE-922'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-18T19:29:59Z', 'nvd_published_at': '2022-05-03T18:15:00Z'}
1.4.0
GHSA-6c2v-xc8f-fvf7
2023-07-20T17:59:09Z
2022-05-13T01:18:38Z
null
['CVE-2018-0937']
ChakraCore RCE Vulnerability
ChakraCore and Microsoft Windows 10 1703 and 1709 allow remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874, CVE-2018-0930, CVE-2018-0931, CVE-2018-0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0937'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/069c3fb1e597f3eaea32092599de4a72bbecc365'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0937'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T17:59:09Z', 'nvd_published_at': '2018-03-14T17:29:00Z'}
1.4.0
GHSA-rfpg-2fp8-2fph
2023-08-29T21:40:33Z
2022-05-17T05:16:32Z
null
['CVE-2012-5339']
phpMyAdmin multiple cross-site scripting vulnerabilities
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.3 allow remote authenticated users to inject arbitrary web script or HTML via a crafted name of (1) an event, (2) a procedure, or (3) a trigger.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5339'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/6ea8fad3f999bfdf79eb6fe31309592bca54d611'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/cfd688d2512df9827a8ecc0412fc264fc5bcb186'}, {'type':...
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:40:33Z', 'nvd_published_at': '2012-10-25T10:51:00Z'}
1.4.0
GHSA-h68c-4jh3-cp9j
2023-07-13T17:07:47Z
2022-05-24T17:11:40Z
null
['CVE-2020-9471']
Umbraco CMS Authenticated File Upload
Umbraco Cloud 8.5.3 allows an authenticated file upload (and consequently Remote Code Execution) via the Install Packages functionality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoCMS.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9471'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}, {'type': 'WEB', 'url': 'https://gitlab.com/eLeN3Re/cve-2020-9471'}, {'type': 'WEB', 'url': 'https://gitlab.com/eLeN3Re/cve-2020-9472/-/blob/master/CVE-2020-9472.pdf'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:07:47Z', 'nvd_published_at': '2020-03-16T20:15:00Z'}
1.4.0
GHSA-q4qq-8q2r-g2f2
2022-12-20T22:11:18Z
2022-05-24T17:27:07Z
null
['CVE-2020-2251']
Passwords transmitted in plain text by Jenkins ReadyAPI Functional Testing Plugin
ReadyAPI Functional Testing Plugin stores project passwords in job `config.xml` files on the Jenkins controller as part of its configuration. While these passwords are stored encrypted on disk since ReadyAPI Functional Testing Plugin 1.4, they are transmitted in plain text as part of the global configuration form by R...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:soapui-pro-functional-testing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2251'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/soapui-pro-functional-testing-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com...
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:11:18Z', 'nvd_published_at': '2020-09-01T14:15:00Z'}
1.4.0
GHSA-vpjm-58cw-r8q5
2022-12-13T15:17:03Z
2022-05-24T17:39:12Z
null
['CVE-2021-21602']
Arbitrary file read vulnerability in workspace browsers in Jenkins
The file browser for workspaces, archived artifacts, and `$JENKINS_HOME/userContent/` follows symbolic links to locations outside the directory being browsed in Jenkins 2.274 and earlier, LTS 2.263.1 and earlier. This allows attackers with Job/Workspace permission and the ability to control workspace contents (e.g., w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.263.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.263.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21602'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-1452'}]
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:52:14Z', 'nvd_published_at': '2021-01-13T16:15:00Z'}
1.4.0
GHSA-qwgx-mrv5-87j8
2022-12-02T21:08:26Z
2022-05-18T00:00:39Z
null
['CVE-2022-30946']
CSRF vulnerability in Jenkins Script Security Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Script Security Plugin 1158.v7c1b_73a_69a_08 and earlier allows attackers to have Jenkins send an HTTP request to an attacker-specified webserver.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1172.v35f6a'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1158.v7c1b'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30946'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/script-security-plugin/commit/35f6a0b8207ed3a32a85f27c1312da6cd738eeaa'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/script-security-plugin'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:08:26Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-48hr-jg4p-w4p4
2022-12-13T18:55:52Z
2022-05-24T17:43:01Z
null
['CVE-2021-21619']
XSS vulnerability in Jenkins Claim Plugin
Claim Plugin 2.18.1 and earlier does not escape the user display name shown in claims. This results in a cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security realm, or directly inside Jenkins. Everyone with a Jenkins acco...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:claim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.18.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21619'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/claim-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T18:55:52Z', 'nvd_published_at': '2021-02-24T16:15:00Z'}
1.4.0
GHSA-966r-962g-2jq5
2023-09-21T23:12:42Z
2022-05-01T18:35:01Z
null
['CVE-2007-5615']
Mortbay Jetty CRLF Injection Vulnerability
CRLF injection vulnerability in Mortbay Jetty before 6.1.6rc0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.6rc0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5615'}, {'type': 'WEB', 'url': 'https://github.com/jetty-project/codehaus-jetty6/commit/0d2592ea3183914163d0921e4855bd3e18582a05'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20071007232422/http://svn.codehaus.org:80/jetty/jetty/trunk/VERS...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T23:12:42Z', 'nvd_published_at': '2007-12-05T11:46:00Z'}
1.4.0
GHSA-hc2f-7r5r-r2hg
2022-06-06T18:13:49Z
2022-05-24T22:15:20Z
null
['CVE-2022-29210']
Heap buffer overflow due to incorrect hash function in TensorFlow
### Impact The [`TensorKey` hash function](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/framework/tensor_key.h#L53-L64) used total estimated `AllocatedBytes()`, which (a) is an estimate per tensor, and (b) is a very poor hash function for constants (e.g. `int32_...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'e...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hc2f-7r5r-r2hg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29210'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1b85a28d395dc91f4d22b5f9e1e9a22e92ccecd6'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:15:20Z', 'nvd_published_at': '2022-05-21T00:15:00Z'}
1.4.0
GHSA-vfxc-r2gx-v2vq
2023-09-29T16:02:16Z
2022-05-24T16:46:55Z
null
['CVE-2019-12496']
Hybrid Group Gobot Improper Certificate Validation vulnerability
An issue was discovered in Hybrid Group Gobot before 1.13.0. The mqtt subsystem skips verification of root CA certificates by default. ### Specific Go Packages Affected github.com/hybridgroup/gobot/platforms/mqtt
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hybridgroup/gobot'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.1-0.20190521122906-c1aa4f867846'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12496'}, {'type': 'WEB', 'url': 'https://github.com/hybridgroup/gobot/commit/c1aa4f867846da4669ecf3bc3318bd96b7ee6f3f'}, {'type': 'PACKAGE', 'url': 'https://github.com/hybridgroup/gobot'}, {'type': 'WEB', 'url': 'https://github.com/hybridgroup/gobo...
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:25:02Z', 'nvd_published_at': '2019-05-31T11:29:00Z'}
1.4.0
GHSA-vqxq-3wqv-r9xp
2023-07-17T20:31:22Z
2022-05-24T16:52:26Z
null
['CVE-2019-7898']
Magento 2 Community Edition Information Disclosure
Samples of disabled downloadable products are accessible in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 due to inadequate validation of user input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7898'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:31:22Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-9g33-48jh-jq7v
2022-12-02T20:42:38Z
2022-05-18T00:00:40Z
null
['CVE-2022-30958']
Cross Site Request Forgery in Jenkins SSH Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins SSH Plugin 2.6.1 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30958'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ssh-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2093'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:55:04Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-w53q-r5cw-6vjh
2022-12-22T13:38:10Z
2022-05-24T17:19:05Z
null
['CVE-2020-2198']
Missing permission check in Jenkins Project Inheritance Plugin
Jenkins Project Inheritance Plugin 21.04.03 and earlier does not redact encrypted secrets in the 'getConfigAsXML' API URL when transmitting job config.xml data to users without Job/Configure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'hudson.plugins:project-inheritance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.04.03'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2198'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1582'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/06/03/3'}]
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:38:10Z', 'nvd_published_at': '2020-06-03T13:15:00Z'}
1.4.0
GHSA-56wf-mx5c-ffjx
2022-12-29T01:12:25Z
2022-05-24T17:22:20Z
null
['CVE-2020-2215']
CSRF vulnerability in Jenkins Zephyr for JIRA Test Management Plugin
A cross-site request forgery vulnerability in Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified username and password.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:zephyr-for-jira-test-management'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2215'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/zephyr-for-jira-test-management-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1762'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lis...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:12:25Z', 'nvd_published_at': '2020-07-02T15:15:00Z'}
1.4.0
GHSA-7xx3-qp5w-fw96
2023-08-31T21:47:44Z
2022-05-24T17:38:59Z
null
['CVE-2020-36191']
Cross-Site Request Forgery in JupyterHub
JupyterHub 1.1.0 allows CSRF in the admin panel via a request that lacks an `_xsrf` field, as demonstrated by a /hub/api/user request (to add or remove a user account).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'jupyterhub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0b1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36191'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/jupyterhub/issues/3304'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7xx3-qp5w-fw96'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/jupyterhub/releases'}, ...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T18:03:58Z', 'nvd_published_at': '2021-01-13T04:15:00Z'}
1.4.0
GHSA-wv88-pf73-x22p
2022-07-13T17:45:52Z
2022-05-17T02:16:01Z
null
['CVE-2011-2730']
Improper Neutralization of Directives in Dynamically Evaluated Code in Spring Framework
VMware SpringSource Spring Framework before 2.5.6.SEC03, 2.5.7.SR023, and 3.x before 3.0.6, when a container supports Expression Language (EL), evaluates EL expressions in tags twice, which allows remote attackers to obtain sensitive information via a (1) name attribute in a (a) spring:hasBindErrors tag; (2) path attri...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'f...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2730'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/1dc1xxO8UMFaGLOwgkykYdghGWm_2Gn0iCrxFsympqcE/edit'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-framework'}, {'type': 'WEB', 'url': 'http://bugs.debian.or...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:45:52Z', 'nvd_published_at': '2012-12-05T17:55:00Z'}
1.4.0
GHSA-rwx9-wqj8-vr77
2022-09-15T19:40:49Z
2022-05-24T17:26:43Z
null
['CVE-2020-24653']
Expo on iOS is insecure due incorrect security attribute application
secure-store in Expo through 9.1.0 on iOS provides the insecure kSecAttrAccessibleAlwaysThisDeviceOnly policy when WHEN_UNLOCKED_THIS_DEVICE_ONLY is used.
[]
[{'package': {'ecosystem': 'npm', 'name': 'expo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24653'}, {'type': 'WEB', 'url': 'https://github.com/expo/expo/pull/9264'}, {'type': 'WEB', 'url': 'https://github.com/expo/expo/commit/1d82bf07fae2c96273e9189997e521359cffc1a9#diff-5b2820f378da980bd8a8185e2e1b2f9ce085d834534483f29c67932f282cc5c9'},...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T19:40:49Z', 'nvd_published_at': '2020-08-26T05:15:00Z'}
1.4.0
GHSA-c4fj-3wqq-g9c9
2023-08-02T21:13:03Z
2022-05-14T00:55:18Z
null
['CVE-2015-1561']
Centreon Command Injection
The `escape_command` function in `include/Administration/corePerformance/getStats.php` in Centreon (formerly Merethis Centreon) 2.5.4 and earlier (offending file deleted in Centreon 19.10.0) uses an incorrect regular expression, which allows remote authenticated users to execute arbitrary commands via shell metacharact...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.28'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1561'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/7083'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/7271'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/comm...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T21:07:53Z', 'nvd_published_at': '2015-07-14T16:59:00Z'}
1.4.0
GHSA-q9wj-f4qw-6vfj
2022-06-17T00:09:35Z
2022-05-24T19:12:03Z
null
['CVE-2021-3712']
Read buffer overruns processing ASN.1 strings
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a str...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3712'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=op...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:09:35Z', 'nvd_published_at': '2021-08-24T15:15:00Z'}
1.4.0
GHSA-785h-hrf7-gqxc
2023-08-02T20:53:09Z
2022-05-14T03:28:46Z
null
['CVE-2015-9258']
Docker Notary Signature Algorithm Not Matched to Key vulnerability
In Docker Notary before 0.1, gotuf/signed/verify.go has a Signature Algorithm Not Matched to Key vulnerability. Because an attacker controls the field specifying the signature algorithm, they might (for example) be able to forge a signature by forcing a misinterpretation of an RSA-PSS key as Ed25519 elliptic-curve data...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/notary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9258'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/notary/blob/master/docs/resources/ncc_docker_notary_audit_2015_07_31.pdf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160305015752/https://docs.docker.com/notary/chan...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T20:53:09Z', 'nvd_published_at': '2018-03-31T21:29:00Z'}
1.4.0
GHSA-wj5c-j656-h5fw
2022-07-01T18:01:00Z
2022-05-13T01:36:55Z
null
['CVE-2017-2600']
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
In Jenkins before versions 2.44 and 2.32.2, node monitor data could be viewed by low privilege users via the remote API. These included system configuration and runtime information of these nodes (SECURITY-343).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.32.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2600'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/0f92cd08a19207de2cceb6a2f4e3e9f92fdc0899'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2600'}, {'type': 'PACKAGE', 'url': 'https://github....
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T18:01:00Z', 'nvd_published_at': '2018-05-15T20:29:00Z'}
1.4.0
GHSA-rr6r-p7rw-369c
2022-06-30T16:30:55Z
2022-05-14T01:04:36Z
null
['CVE-2018-1000409']
Session Fixation in Jenkins
A session fixation vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java that prevented Jenkins from invalidating the existing session and creating a new one when a user signed up for a new user account.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.138.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.138.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000409'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-10-10/#SECURITY-1158'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106532'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T16:30:55Z', 'nvd_published_at': '2019-01-09T23:29:00Z'}
1.4.0
GHSA-443j-6p7g-6v4w
2023-07-19T23:24:06Z
2022-05-24T17:20:25Z
null
['CVE-2018-16848']
OpenStack Mistral DoS
A Denial of Service (DoS) condition is possible in OpenStack Mistral in versions up to and including 7.0.3. Submitting a specially crafted workflow definition YAML file containing nested anchors can lead to resource exhaustion culminating in a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mistral'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16848'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/mistral/+bug/1785657'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1645332'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/mistral'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T23:24:06Z', 'nvd_published_at': '2020-06-15T15:15:00Z'}
1.4.0
GHSA-mg66-qvc5-rm93
2022-05-24T22:08:45Z
2022-05-24T22:08:45Z
null
['CVE-2022-29198']
Missing validation causes denial of service via `SparseTensorToCSRSparseMatrix`
### Impact The implementation of [`tf.raw_ops.SparseTensorToCSRSparseMatrix`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/sparse/sparse_tensor_to_csr_sparse_matrix_op.cc#L65-L119) does not fully validate the input arguments. This results in a `CHECK`-fa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mg66-qvc5-rm93'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29198'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ea50a40e84f6bff15a0912728e35b657548cef11'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:08:45Z', 'nvd_published_at': '2022-05-20T22:16:00Z'}
1.4.0
GHSA-xrxm-mvqm-r553
2023-09-28T20:38:53Z
2022-05-14T01:33:54Z
null
['CVE-2019-1000008']
Helm Path Traversal
All versions of Helm between Helm >=2.0.0 and < 2.12.2 contains a CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The commands `helm fetch --untar` and `helm lint some.tgz` that can result when chart archive files are unpacked a file may be unpacked outside of the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.12.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000008'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://helm.sh/blog/helm-security-notice-2019/index.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:14:08Z', 'nvd_published_at': '2019-02-04T21:29:00Z'}
1.4.0
GHSA-xjr9-2wf2-3v4w
2023-08-16T22:18:14Z
2022-05-14T02:00:54Z
null
['CVE-2014-9120']
Subrion CMS Cross-site scripting in search
A cross-site scripting (XSS) vulnerability in Subrion CMS before 3.2.3 allows remote attackers to inject arbitrary web script or HTML via the `PATH_INFO` to `subrion/search/`.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9120'}, {'type': 'WEB', 'url': 'https://www.netsparker.com/xss-vulnerability-in-subrion-cms/'}, {'type': 'WEB', 'url': 'http://dev.subrion.org/versions/130'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:18:14Z', 'nvd_published_at': '2014-12-10T15:59:00Z'}
1.4.0
GHSA-2655-q453-22f9
2023-08-29T22:33:16Z
2022-05-17T05:10:31Z
null
['CVE-2012-4520']
Django Allows Arbitrary URL Generation
The `django.http.HttpRequest.get_host` function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3'}, {'fixed': '1.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4520'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T22:33:16Z', 'nvd_published_at': '2012-11-18T23:55:00Z'}
1.4.0
GHSA-mcvq-7xjq-46x6
2023-01-23T14:37:59Z
2022-05-17T04:55:27Z
null
['CVE-2013-7223']
Fat Free CRM contains Cross-site Request Forgery vulnerablilities
Multiple cross-site request forgery (CSRF) vulnerabilities in Fat Free CRM before 0.12.1 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors, related to the lack of a `protect_from_forgery` line in `app/controllers/application_controller.rb`.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7223'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/issues/300'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/a7fedbb36388bad0c0f32b2346481e0ea126dea6'}, {'type': 'PACKAGE', 'url': 'https://githu...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T14:37:59Z', 'nvd_published_at': '2014-01-02T14:59:00Z'}
1.4.0
GHSA-fjj8-gv4j-953p
2023-07-31T19:06:58Z
2022-05-14T02:25:02Z
null
['CVE-2016-0186']
ChakraCore RCE Vulnerability
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0191 and CVE-2016-0193.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0186'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d21529b131d831fc4470139bfc90d80ae7481fa2'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-052'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:06:58Z', 'nvd_published_at': '2016-05-11T01:59:00Z'}
1.4.0
GHSA-f46p-q6jh-226m
2022-09-08T22:31:03Z
2022-05-24T16:56:46Z
null
['CVE-2019-10418']
Incorrect Authorization in Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin
Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin provides a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.fabric8.pipeline:kubernetes-pipeline-arquillian-steps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10418'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-pipeline-plugin/blob/master/arquillian-steps'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-920%20(2)'}, {'type': 'WEB', 'url': 'http...
{'cwe_ids': ['CWE-183', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T22:31:03Z', 'nvd_published_at': '2019-09-25T16:15:00Z'}
1.4.0
GHSA-hvxr-2fvv-c3wq
2023-02-08T18:10:02Z
2022-05-13T01:07:31Z
null
['CVE-2017-7543']
OpenStack Neutron Race Condition vulnerability
A race-condition flaw was discovered in openstack-neutron before 7.2.0-12.1, 8.x before 8.3.0-11.1, 9.x before 9.3.1-2.1, and 10.x before 10.0.2-1.1, where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'neutron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.0-12.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'neutron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.3.0-11.1'}]}]}, {'package': {'ecosy...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7543'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2447'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2448'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2449'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:10:02Z', 'nvd_published_at': '2018-07-26T14:29:00Z'}
1.4.0
GHSA-v882-949x-6v28
2023-07-26T21:48:04Z
2022-05-14T01:04:04Z
null
['CVE-2017-12872']
SimpleSAMLphp allows timing side-channel attacks
The (1) Htpasswd authentication source in the authcrypt module and (2) SimpleSAML_Session class in SimpleSAMLphp 1.14.11 and earlier allow remote attackers to conduct timing side-channel attacks by leveraging use of the standard comparison operator to compare secret material against user input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/simplesamlphp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.0-rc1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12872'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp/commit/b72c79e3070f930d758f5c269333d63ed7509e2e'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T21:48:04Z', 'nvd_published_at': '2017-09-01T21:29:00Z'}
1.4.0
GHSA-5c66-6h6g-6q6m
2022-07-07T23:14:08Z
2022-05-13T01:12:18Z
null
['CVE-2013-7398']
Insufficient Verification of Data Authenticity in Async Http Client
main/java/com/ning/http/client/AsyncHttpClientConfig.java in Async Http Client (aka AHC or async-http-client) before 1.9.0 does not require a hostname match during verification of X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.ning:async-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7398'}, {'type': 'WEB', 'url': 'https://github.com/AsyncHttpClient/async-http-client/issues/197'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E...
{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:14:08Z', 'nvd_published_at': '2015-06-24T16:59:00Z'}
1.4.0
GHSA-4f79-fxh8-vgq2
2023-07-21T20:18:10Z
2022-05-13T01:20:46Z
null
['CVE-2018-8288']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8288'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5444'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f9b1cded66314c52ab2de8e4e68efb854bd6b9aa'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:18:10Z', 'nvd_published_at': '2018-07-11T00:29:00Z'}
1.4.0
GHSA-m246-pv28-4r6f
2023-07-25T20:07:58Z
2022-05-14T02:00:08Z
null
['CVE-2018-17366']
Mingsoft MCMS CSRF vulnerability
An issue was discovered in MCMS 4.6.5. There is a CSRF vulnerability that can add an administrator account via ms/basic/manager/save.do.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17366'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/IM1DA'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T20:07:58Z', 'nvd_published_at': '2018-09-23T18:29:00Z'}
1.4.0
GHSA-xrh2-c3rm-35jr
2022-11-22T18:45:47Z
2022-05-24T22:01:08Z
null
['CVE-2014-3599']
HornetQ REST vulnerable to Improper Restriction of XML External Entity Reference
HornetQ REST is vulnerable to XML External Entity due to insecure configuration of RestEasy.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.hornetq.rest:hornetq-rest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0.Beta1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3599'}, {'type': 'WEB', 'url': 'https://github.com/hornetq/hornetq/commit/b3a63576371828d5f8e64ba7ccbcecb1da8111d2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2014-3599'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.co...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:45:47Z', 'nvd_published_at': '2019-11-12T14:15:00Z'}
1.4.0
GHSA-588w-w6mv-3cw5
2023-02-08T18:09:23Z
2022-05-13T01:06:04Z
null
['CVE-2017-7550']
Ansible Insertion of Sensitive Information into Log File vulnerability
A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords to be specified in the "params" argument,...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7550'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/30874'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2966'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2017-7550'}, {'type': '...
{'cwe_ids': ['CWE-532'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:09:23Z', 'nvd_published_at': '2017-11-21T17:29:00Z'}
1.4.0
GHSA-jhm7-38xj-pvm8
2023-02-07T18:24:03Z
2022-05-17T05:45:48Z
null
['CVE-2010-2235']
Cobbler is vulnerable to code injection
template_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticated administrators to execute arbitrary code via a crafted kickstart tem...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-2235'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2010:0775'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2010-2235'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=607662'}, {'type'...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T18:24:03Z', 'nvd_published_at': '2010-12-09T20:00:00Z'}
1.4.0
GHSA-29mr-gr4c-vf9c
2023-09-26T18:53:44Z
2022-05-24T17:00:25Z
null
['CVE-2019-8115']
Magento 2 Community Edition XSS Vulnerability
A reflected cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can inject arbitrary JavaScript code when adding an image for during simple product creation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8115'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:50:53Z', 'nvd_published_at': '2019-11-05T23:15:00Z'}
1.4.0
GHSA-hw6x-2qwv-rxr7
2022-06-28T22:28:13Z
2022-05-24T16:55:58Z
null
['CVE-2019-10392']
Improper Neutralization of Special Elements used in an OS Command in Jenkins Git Client Plugin
Jenkins Git Client Plugin 2.8.4 and earlier did not properly restrict values passed as URL argument to an invocation of 'git ls-remote', resulting in OS command injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10392'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1534'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/12/2'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:28:13Z', 'nvd_published_at': '2019-09-12T14:15:00Z'}
1.4.0
GHSA-fv87-p7qr-xh5x
2023-09-28T20:24:02Z
2022-05-13T01:21:40Z
null
['CVE-2019-0860']
ChakraCore Memory Corruption Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0806, CVE-2019-0810, CVE-2019-0812, CVE-2019-0829, CVE-2019-0861.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0860'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6087'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/9a9ece61b560fe84f451625140bb46d35fb3b045'}, {'type': 'PACKAGE', 'url': 'https://github.c...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T19:05:29Z', 'nvd_published_at': '2019-04-09T21:29:00Z'}
1.4.0
GHSA-6364-jx4h-7564
2022-12-15T16:53:53Z
2022-05-24T17:45:46Z
null
['CVE-2021-21637']
Missing permission check in Jenkins Team Foundation Server Plugin allow capturing credentials
A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:tfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.157.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21637'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/tfs-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2...
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T16:53:53Z', 'nvd_published_at': '2021-03-30T12:16:00Z'}
1.4.0
GHSA-gqqf-8cx6-9r7h
2023-07-13T17:15:15Z
2022-05-24T17:07:13Z
null
['CVE-2020-7210']
Umbraco CMS vulnerable to CSRF
Umbraco CMS 8.2.2 allows CSRF to enable/disable or delete user accounts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoCMS.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7210'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}, {'type': 'WEB', 'url': 'https://sec-consult.com/en/blog/advisories/cross-site-request-forgery-csrf-in-umbraco-cms/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:15:15Z', 'nvd_published_at': '2020-01-23T13:15:00Z'}
1.4.0
GHSA-qpg2-vx7j-3869
2022-06-27T16:52:31Z
2022-05-24T22:00:57Z
null
['CVE-2019-17626']
XML Injection in ReportLab
ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'reportlab'}, 'ecosystem_specific': {'affected_functions': ['reportlab.lib.colors.toColor.__call__']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.28'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17626'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0195'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0197'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0201'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-91'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T16:52:31Z', 'nvd_published_at': '2019-10-16T12:15:00Z'}
1.4.0
GHSA-4c93-q79v-mw45
2023-07-21T20:30:53Z
2022-05-13T01:20:55Z
null
['CVE-2018-8466']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8367, CVE-2018-8465, CVE-2018-8467.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8466'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5688'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/a404dec6506962d9a608ca9642b0aab147a0f8d1'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:30:53Z', 'nvd_published_at': '2018-09-13T00:29:00Z'}
1.4.0
GHSA-mjg2-326q-49f9
2023-07-21T19:21:11Z
2022-05-13T01:20:58Z
null
['CVE-2018-8551']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8551'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5827'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6199b5e19a61744f5d2357bbbaf1b50dd284c4a6'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:21:11Z', 'nvd_published_at': '2018-11-14T01:29:00Z'}
1.4.0
GHSA-36hp-4x3g-phrg
2023-09-22T21:05:24Z
2022-05-01T18:13:15Z
null
['CVE-2007-3384']
Apache Tomcat's CookieExample Vulnerable to XSS
Multiple cross-site scripting (XSS) vulnerabilities in `examples/servlet/CookieExample` in Apache Tomcat 3.3 through 3.3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) Name or (2) Value field, related to error messages.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'last_affected': '3.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-3384'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20070824135030/http://securityreason.com/securityalert/2971'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20071117100258/http://securitytracker.com/alerts/2007/Aug/1018503.html'},...
{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:05:24Z', 'nvd_published_at': '2007-08-08T01:17:00Z'}
1.4.0
GHSA-cr6r-6xm9-ww22
2023-08-28T23:18:09Z
2022-05-14T01:33:07Z
null
['CVE-2018-20745']
Yii Incorrectly Implements CORS
Yii 2.x through 2.0.15.1 actively converts a wildcard CORS policy into reflecting an arbitrary Origin header value, which is incompatible with the CORS security design, and could lead to CORS misconfiguration security problems.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20745'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/issues/16193'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/pull/16198'}, {'type': 'WEB', 'url': 'https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-che...
{'cwe_ids': ['CWE-346'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:18:09Z', 'nvd_published_at': '2019-01-28T08:29:00Z'}
1.4.0
GHSA-99rf-92v6-cwx4
2022-07-12T22:16:48Z
2022-05-17T00:57:35Z
null
['CVE-2012-5885']
Improper Access Control in Apache Tomcat
The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote att...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.36'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5885'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/80408'}, {'type': 'WEB', 'url': 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19432'}, {'type': 'WEB', 'url': 'http://lis...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:16:48Z', 'nvd_published_at': '2012-11-17T19:55:00Z'}
1.4.0
GHSA-c8c8-9472-w52h
2023-07-31T18:31:52Z
2022-05-14T02:46:13Z
null
['CVE-2016-6186']
Django XSS Vulnerability
Cross-site scripting (XSS) vulnerability in the `dismissChangeRelatedObjectPopup` function in `contrib/admin/static/admin/js/admin/RelatedObjectLookups.js` in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe u...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9'}, {'fixed': '1.9.8'}]}]}, {'package': {'ecosystem': 'PyPI'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6186'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:31:52Z', 'nvd_published_at': '2016-08-05T15:59:00Z'}
1.4.0
GHSA-phcc-frh9-q545
2023-07-20T18:01:18Z
2022-05-13T01:18:38Z
null
['CVE-2018-0934']
ChakraCore RCE Vulnerability
ChakraCore and Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874,...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0934'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6d0f5de1e0331fd6dd4f1ee0c0032430bcb131c3'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0934'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:01:18Z', 'nvd_published_at': '2018-03-14T17:29:00Z'}
1.4.0
GHSA-f8r7-7hv9-7f43
2022-12-12T16:34:18Z
2022-05-14T03:13:13Z
null
['CVE-2018-1000188']
Jenkins CAS Plugin Server-Side Request Forgery vulnerability
A server-side request forgery vulnerability exists in Jenkins CAS Plugin 1.4.1 and older in CasSecurityRealm.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL. Additionally, this form validation method did not require POST requests, resulting in a CSRF vulnera...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cas-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000188'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cas-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-04/#SECURITY-809'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:34:18Z', 'nvd_published_at': '2018-06-05T20:29:00Z'}