schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-3wfj-vh84-732p | 2022-07-07T22:40:47Z | 2022-05-14T01:14:52Z | null | ['CVE-2014-3576'] | Improper Neutralization of Special Elements used in an OS Command in Apache ActiveMQ | The processControlCommand function in broker/TransportConnection.java in Apache ActiveMQ before 5.11.0 allows remote attackers to cause a denial of service (shutdown) via a shutdown command. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3576'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq/commit/00921f2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E'}, {'type':... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:40:47Z', 'nvd_published_at': '2015-08-14T18:59:00Z'} |
1.4.0 | GHSA-hp5f-qqrw-c8gj | 2023-07-11T18:24:03Z | 2022-05-24T22:28:42Z | null | ['CVE-2021-37939'] | Kibana Sensitive Data Disclosure | It was discovered that Kibana’s JIRA connector & IBM Resilient connector could be used to return HTTP response data on internal hosts, which may be intentionally hidden from public view. Using this vulnerability, a malicious user with the ability to create connectors, could utilize these connectors to view limited HTTP... | [] | [{'package': {'ecosystem': 'npm', 'name': 'kibana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.8.0'}, {'fixed': '7.15.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.15.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37939'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/kibana-7-15-2-security-update/288923'}] | {'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T18:24:03Z', 'nvd_published_at': '2021-11-18T16:15:00Z'} |
1.4.0 | GHSA-4wpp-w5r4-7v5v | 2022-05-24T20:55:22Z | 2022-05-24T20:55:22Z | null | ['CVE-2022-29180'] | Server-Side Request Forgery in charm | We've discovered a vulnerability in which attackers could forge HTTP requests to manipulate the `charm` data directory to access or delete anything on the server. This has been patched in https://github.com/charmbracelet/charm/commit/3c90668f955c7ce5ef721e4fc9faee7053232fd3 and is available in release [v0.12.1](https:/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/charmbracelet/charm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.12.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/charmbracelet/charm/security/advisories/GHSA-4wpp-w5r4-7v5v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29180'}, {'type': 'WEB', 'url': 'https://github.com/charmbracelet/charm/commit/3c90668f955c7ce5ef721e4fc9faee7053232fd3'}, {'type': 'PACKAGE',... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T20:55:22Z', 'nvd_published_at': '2022-05-07T04:15:00Z'} |
1.4.0 | GHSA-h6p6-fc4w-cqhx | 2022-07-06T21:05:00Z | 2022-05-17T04:15:16Z | null | ['CVE-2014-7816'] | Improper Limitation of a Pathname to a Restricted Directory in JBoss Undertow | Directory traversal vulnerability in JBoss Undertow 1.0.x before 1.0.17, 1.1.x before 1.1.0.CR5, and 1.2.x before 1.2.0.Beta3, when running on Windows, allows remote attackers to read arbitrary files via a .. (dot dot) in a resource URI. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0.Beta1'}, {'fi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7816'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1157478'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/UNDERTOW-338'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/WFLY-4020'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:05:00Z', 'nvd_published_at': '2014-12-01T15:59:00Z'} |
1.4.0 | GHSA-9qf9-28h9-hqcj | 2022-11-04T18:40:40Z | 2022-05-13T01:02:43Z | null | ['CVE-2017-8046'] | Remote code execution in PATCH requests in Spring Data REST | Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) can use specially crafted JSON data to run arbitrary Java code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-rest-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.9.RELEASE'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-rest-core'}, 'ranges': [{'type': 'ECOSYSTEM', '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8046'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-data-rest/issues/1487'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-data-rest/issues/1520'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/R... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:40:40Z', 'nvd_published_at': '2018-01-04T06:29:00Z'} |
1.4.0 | GHSA-6fxv-38xc-h866 | 2023-02-03T00:19:58Z | 2022-05-02T03:12:28Z | null | ['CVE-2009-0026'] | Apache Jackrabbit contains Cross-site Scripting | Multiple cross-site scripting (XSS) vulnerabilities in Apache Jackrabbit before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the q parameter to (1) search.jsp or (2) swr.jsp. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-0026'}, {'type': 'WEB', 'url': 'https://github.com/apache/jackrabbit/commit/36330ae8df40ceaddf9f3f95b8d4855b54921579'}, {'type': 'WEB', 'url': 'https://github.com/apache/jackrabbit/commit/fbdcc02bc35db1d23b527da7bc411087ef29bf1f'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-03T00:19:58Z', 'nvd_published_at': '2009-01-21T20:30:00Z'} |
1.4.0 | GHSA-4xq9-vw89-p5cx | 2023-01-23T14:41:58Z | 2022-05-17T04:55:27Z | null | ['CVE-2013-7224'] | Fat Free CRM allows remote attackers to obtain sensitive information via a direct request | Fat Free CRM before 0.12.1 does not restrict JSON serialization, which allows remote attackers to obtain sensitive information via a direct request, as demonstrated by a request for `users/1.json`. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7224'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/issues/300'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/cf26a04b356ad2161c4c6160260eb870a3de5328'}, {'type': 'PACKAGE', 'url': 'https://githu... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T14:41:58Z', 'nvd_published_at': '2014-01-02T14:59:00Z'} |
1.4.0 | GHSA-cvvx-r33m-v7pq | 2022-07-06T20:28:01Z | 2022-05-14T03:15:11Z | null | ['CVE-2015-0899'] | Improper Input Validation in Apache Struts | The MultiPageValidator implementation in Apache Struts 1 1.1 through 1.3.10 allows remote attackers to bypass intended access restrictions via a modified page parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1'}, {'last_affected': '1.3.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0899'}, {'type': 'WEB', 'url': 'https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-EN'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180629-0006/'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN86448949/index.html'},... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:28:01Z', 'nvd_published_at': '2016-07-04T22:59:00Z'} |
1.4.0 | GHSA-9xwq-72vp-5j3c | 2022-11-04T18:44:51Z | 2022-05-17T01:17:22Z | null | ['CVE-2017-3152'] | Cross-site Scripting in Apache Atlas | Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to DOM XSS in the edit-tag functionality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:atlas-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1-incubating'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3152'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/atlas'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4a4fef91e067fd0d9da569e30867c1fa65e2a0520acde71ddefee0ea@%3Cdev.atlas.apache.org%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:44:51Z', 'nvd_published_at': '2017-08-29T20:29:00Z'} |
1.4.0 | GHSA-j249-ghv5-7mxv | 2023-08-15T20:17:38Z | 2022-05-24T16:50:40Z | null | ['CVE-2019-13509'] | Secret insertion into debug log in Docker | In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially appli... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.09.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13509'}, {'type': 'WEB', 'url': 'https://docs.docker.com/engine/release-notes/18.09/'}] | {'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:17:38Z', 'nvd_published_at': '2019-07-18T16:15:00Z'} |
1.4.0 | GHSA-67q3-gwww-pm4g | 2022-11-22T18:57:02Z | 2022-05-17T02:28:11Z | null | ['CVE-2017-7664'] | Apache OpenMeetings does not correctly validate uploaded XML documents | Uploaded XML documents were not correctly validated in Apache OpenMeetings 3.1.0. The issue is fixed in version 3.3.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7664'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/cwr552iapmhukb45'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99576'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:02Z', 'nvd_published_at': '2017-07-17T13:18:00Z'} |
1.4.0 | GHSA-6jp2-hggx-8j7p | 2022-12-12T20:58:11Z | 2022-05-17T00:29:00Z | null | ['CVE-2017-1000087'] | Jenkins GitHub Branch Source Plugin allows any user with Overall/Read permission to get list of valid credentials IDs | GitHub Branch Source provides a list of applicable credential IDs to allow users configuring a job to select the one they'd like to use. This functionality did not check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those could be used as part of an attack to captur... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:github-branch-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0-alpha-1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000087'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/github-branch-source-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-07-10/'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T20:58:11Z', 'nvd_published_at': '2017-10-05T01:29:00Z'} |
1.4.0 | GHSA-q8qq-2p5p-rg44 | 2022-12-16T22:55:37Z | 2022-05-24T17:17:14Z | null | ['CVE-2020-2185'] | Missing SSH host key validation in Amazon EC2 Plugin | Amazon EC2 Plugin 1.50.1 and earlier does not use SSH host key validation when connecting to agents. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections to build agents.
Amazon EC2 Plugin 1.50.2 provides strategies for performing host key validation for administrator... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.50.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.50.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2185'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-05-06/#SECURITY-381'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/05/06/3'... | {'cwe_ids': ['CWE-300'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T22:55:37Z', 'nvd_published_at': '2020-05-06T13:15:00Z'} |
1.4.0 | GHSA-jrcp-c39h-r29x | 2022-07-06T20:12:06Z | 2022-05-14T03:13:01Z | null | ['CVE-2015-5346'] | Improper Neutralization of Input During Web Page Generation in Apache Tomcat | Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field f... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M2'}]}], 'versions': ['9.0.0.M1']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5346'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1087'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1088'}, {'type': 'WEB', 'url': 'https://bto.bluecoat.com/security-advisory/sa118'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:12:06Z', 'nvd_published_at': '2016-02-25T01:59:00Z'} |
1.4.0 | GHSA-m36j-f2hf-qgj2 | 2022-12-06T21:39:52Z | 2022-05-24T16:59:38Z | null | ['CVE-2019-10472'] | Jenkins Libvirt Slaves Plugin vlnerable to Incorrect Default Permissions | A missing permission check in Jenkins Libvirt Slaves Plugin allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:libvirt-slave'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10472'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/libvirt-slave-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:39:52Z', 'nvd_published_at': '2019-10-23T13:15:00Z'} |
1.4.0 | GHSA-mjgf-xmrr-6gvx | 2023-09-25T18:56:49Z | 2022-05-24T16:52:22Z | null | ['CVE-2019-7853'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to the tax notifications configuration in the Magento admin panel. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7853'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220127030535/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-24'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:21:49Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-69cj-g7mw-mh72 | 2022-12-12T16:23:48Z | 2022-05-17T00:33:25Z | null | ['CVE-2017-1000094'] | Jenkins Docker Commons Plugin allows any user with Overall/Read permission to get list of valid credentials IDs | Docker Commons Plugin provides a list of applicable credential IDs to allow users configuring a job to select the one they'd like to use to authenticate with a Docker Registry. This functionality did not check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those coul... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:docker-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000094'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/docker-commons-plugin/commit/07ddeff5331687db364d681504117b4e8b2dde6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/docker-commons-plugin'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:23:48Z', 'nvd_published_at': '2017-10-05T01:29:00Z'} |
1.4.0 | GHSA-hv53-qjg6-5pm9 | 2022-12-20T17:39:30Z | 2022-05-24T17:13:39Z | null | ['CVE-2020-2173'] | XSS vulnerability in Jenkins Gatling Plugin | Gatling Plugin 1.2.7 and earlier serves Gatling reports in a manner that bypasses the `Content-Security-Policy` protection introduced in Jenkins 1.641 and 1.625.3. This results in a cross-site scripting (XSS) vulnerability exploitable by users able to change report content.
Gatling Plugin 1.3.0 no longer allows viewin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gatling'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2173'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/gatling-plugin/commit/8a9ae59c6b3328776d38af6596b35cef1ced05a7'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-04-07/#SECURITY-1633'}, {'type': 'WEB', 'url': 'http://... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:39:30Z', 'nvd_published_at': '2020-04-07T13:15:00Z'} |
1.4.0 | GHSA-q52r-g8jf-wv3x | 2022-11-22T18:57:26Z | 2022-05-13T01:47:04Z | null | ['CVE-2017-7680'] | Apache OpenMeetings allows flash content to be loaded from untrusted domains | Apache OpenMeetings 1.0.0 has an overly permissive `crossdomain.xml` file. This allows for flash content to be loaded from untrusted domains. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7680'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/whhibri7ervbjvda'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:26Z', 'nvd_published_at': '2017-07-17T13:18:00Z'} |
1.4.0 | GHSA-cqgv-256r-m9r8 | 2022-06-23T17:58:18Z | 2022-05-24T17:41:42Z | null | ['CVE-2020-7021'] | Insertion of Sensitive Information into Log File in Elasticsearch | Elasticsearch versions before 7.10.0 and 6.8.14 have an information disclosure issue when audit logging and the emit_request_body option is enabled. The Elasticsearch audit log could contain sensitive information such as password hashes or authentication tokens. This could allow an Elasticsearch administrator to view t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.8.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.8.13'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7021'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-11-0-and-6-8-14-security-update/263915'}, {'type': 'PACKAGE', 'url': 'https://github.com/elastic/elasticsearch'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advis... | {'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:58:18Z', 'nvd_published_at': '2021-02-10T19:15:00Z'} |
1.4.0 | GHSA-j544-7q9p-6xp8 | 2023-02-02T01:32:51Z | 2022-05-24T16:51:33Z | null | ['CVE-2019-14322'] | Pallets Werkzeug vulnerable to Path Traversal | In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'werkzeug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14322'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/werkzeug/'}, {'type': 'WEB', 'url': 'https://palletsprojects.com/blog/werkzeug-0-15-5-released/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163398/Pallets-Werkzeug-... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T01:32:51Z', 'nvd_published_at': '2019-07-28T13:15:00Z'} |
1.4.0 | GHSA-hpv5-v8g5-c864 | 2023-08-08T11:20:28Z | 2022-05-17T00:26:00Z | null | ['CVE-2017-15612'] | Cross-site Scripting in Mistune | mistune.py in Mistune 0.7.4 allows XSS via an unexpected newline (such as in java\nscript:) or a crafted email address, related to the escape and autolink functions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mistune'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15612'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/pull/140'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/commit/d6f0b6402299bf5a380e7b4e77bd80e8736630fe'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T19:44:32Z', 'nvd_published_at': '2017-10-19T08:29:00Z'} |
1.4.0 | GHSA-wc97-7623-rxwx | 2022-05-18T18:58:58Z | 2022-05-01T00:00:33Z | null | ['CVE-2022-29265'] | Multiple components in Apache NiFi do not restrict XML External Entity references | Apache NiFi is a system to process and distribute data. Multiple components in Apache NiFi 0.0.1 to 1.16.0 do not restrict XML External Entity references in the default configuration. The Standard Content Viewer service attempts to resolve XML External Entity references when viewing formatted XML files. The following P... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'fixed': '1.16.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29265'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/47od9kr9n4cyv0mv81jh3pkyx815kyjl'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2022-29265'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-18T18:58:58Z', 'nvd_published_at': '2022-04-30T08:15:00Z'} |
1.4.0 | GHSA-q3pw-6vf2-66hf | 2023-07-31T21:12:28Z | 2022-05-17T02:52:22Z | null | ['CVE-2016-4976'] | Apache Ambari reveals administrator passwords | Apache Ambari 2.x before 2.4.0 includes KDC administrator passwords on the kadmin command line, which allows local users to obtain sensitive information via a process listing. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ambari:ambari'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4976'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/AMBARI/Ambari+Vulnerabilities#AmbariVulnerabilities-FixedinAmbari2.4.0'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124014838/http://www.securityfocus.com/bi... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:12:28Z', 'nvd_published_at': '2017-03-29T20:59:00Z'} |
1.4.0 | GHSA-xqw9-ffx7-g998 | 2023-07-31T19:55:43Z | 2022-05-17T02:37:29Z | null | ['CVE-2016-5702'] | phpMyAdmin cookie-attribute injection | phpMyAdmin 4.6.x before 4.6.3, when the environment lacks a PHP_SELF value, allows remote attackers to conduct cookie-attribute injection attacks via a crafted URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5702'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/27caf5b46bd0890e576fea7bd7b166a0639fdf68'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/sec... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:55:43Z', 'nvd_published_at': '2016-07-03T01:59:00Z'} |
1.4.0 | GHSA-4x32-h296-rg6j | 2023-07-22T00:00:49Z | 2022-05-14T01:01:38Z | null | ['CVE-2018-12021'] | Singularity Incorrect Access Control | Singularity 2.3.0 through 2.5.1 is affected by an incorrect access control on systems supporting overlay file system. When using the overlay option, a malicious user may access sensitive information by exploiting a few specific Singularity features. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hpcng/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'last_affected': '2.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12021'}, {'type': 'WEB', 'url': 'https://github.com/singularityware/singularity/releases/tag/2.5.2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/05/16/1'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-22T00:00:49Z', 'nvd_published_at': '2018-07-05T18:29:00Z'} |
1.4.0 | GHSA-gxcf-6h72-8gxf | 2023-07-21T22:07:11Z | 2022-05-13T01:20:49Z | null | ['CVE-2018-8367'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8465, CVE-2018-8466, CVE-2018-8467. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8367'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5688'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/dd5b2e75e7aebe67b5185383080c0648f5353ea0'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:07:11Z', 'nvd_published_at': '2018-09-13T00:29:00Z'} |
1.4.0 | GHSA-vx5c-598g-qpg6 | 2023-07-28T20:20:13Z | 2022-05-14T02:22:41Z | null | ['CVE-2016-7208'] | ChakraCore RCE Vulnerability | The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7208'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1982'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c2787ef8fdb7401922e9ec6540e4e5895d11c631'}, {'type': 'WEB', 'url': 'https://docs.microso... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:20:13Z', 'nvd_published_at': '2016-11-10T06:59:00Z'} |
1.4.0 | GHSA-67rh-9p29-vrxr | 2023-02-08T18:12:12Z | 2022-05-14T01:58:45Z | null | ['CVE-2015-7713'] | OpenStack Compute (Nova) allows remote attackers to bypass intended restriction | OpenStack Compute (Nova) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) do not properly apply security group changes, which allows remote attackers to bypass intended restriction by leveraging an instance that was running when the change was made. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2014.2.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2015.1.0'}, {'fixed': '2015.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7713'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:2673'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:2684'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0013'}, {'type': 'WEB',... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:12:12Z', 'nvd_published_at': '2015-10-29T20:59:00Z'} |
1.4.0 | GHSA-vmvp-2hhx-rgm8 | 2022-11-01T22:47:53Z | 2022-05-24T17:03:46Z | null | ['CVE-2019-16551'] | Cross-Site Request Forgery in Jenkins Gerrit Trigger Plugin | A cross-site request forgery vulnerability in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.30.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16551'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1527'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:47:53Z', 'nvd_published_at': '2019-12-17T15:15:00Z'} |
1.4.0 | GHSA-799h-qr84-pcrp | 2023-07-31T18:23:01Z | 2022-05-13T01:26:14Z | null | ['CVE-2016-3691'] | Kallithea Routes CSRF Bypass | Routes in Kallithea before 0.3.2 allows remote attackers to bypass the CSRF protection by using the GET HTTP request method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'kallithea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3691'}, {'type': 'PACKAGE', 'url': 'https://github.com/NexMirror/Kallithea'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/05/02/3'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:23:01Z', 'nvd_published_at': '2017-04-24T18:59:00Z'} |
1.4.0 | GHSA-x25x-j4w4-7m59 | 2022-06-28T22:41:36Z | 2022-05-24T16:51:50Z | null | ['CVE-2019-10356'] | Return of Pointer Value Outside of Expected Rang in Jenkins Script Security Plugin | A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of method pointer expressions allowed attackers to execute arbitrary code in sandboxed scripts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.62'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.61'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10356'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2594'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2651'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2662'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-466'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:41:36Z', 'nvd_published_at': '2019-07-31T13:15:00Z'} |
1.4.0 | GHSA-vpqm-88c4-x4cv | 2022-06-28T23:22:24Z | 2022-05-13T01:34:04Z | null | ['CVE-2018-17244'] | Exposure of Sensitive Information to an Unauthorized Actor in Elasticsearch | Elasticsearch Security versions 6.4.0 to 6.4.2 contain an error in the way request headers are applied to requests when using the Active Directory, LDAP, Native, or File realms. A request may receive headers intended for another request if the same username is being authenticated concurrently; when used with run as, th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17244'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-6-4-3-and-5-6-13-security-update/155594'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:22:24Z', 'nvd_published_at': '2018-12-20T22:29:00Z'} |
1.4.0 | GHSA-fcf9-6fv2-fc5v | 2023-02-08T00:36:45Z | 2022-05-13T01:19:23Z | null | ['CVE-2018-17143'] | golang.org/x/net/html has Improper Restriction of Operations within the Bounds of a Memory Buffer | The html package (aka x/net/html) through 2018-09-17 in Go mishandles <template><tBody><isindex/action=0>, leading to a "panic: runtime error" in inBodyIM in parse.go during an html.Parse call. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20180921000356-2f5d2388922f'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17143'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/27704'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/go'}, {'type': 'WEB', 'url': 'https://go-review.googlesource.com/c/net/+/136575'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:36:45Z', 'nvd_published_at': '2018-09-17T14:29:00Z'} |
1.4.0 | GHSA-c9gx-27hq-wcvj | 2023-08-17T23:34:09Z | 2022-05-17T03:46:32Z | null | ['CVE-2013-1880'] | Apache ActiveMQ Cross-site scripting (XSS) vulnerability in the Portfolio publisher servlet | Cross-site scripting (XSS) vulnerability in the Portfolio publisher servlet in the demo web application in Apache ActiveMQ before 5.9.0 allows remote attackers to inject arbitrary web script or HTML via the refresh parameter to demo/portfolioPublish, a different vulnerability than CVE-2012-6092. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1880'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=924447'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AMQ-4398'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1029.html'}, {'type': 'WE... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T23:34:09Z', 'nvd_published_at': '2014-02-05T18:55:00Z'} |
1.4.0 | GHSA-c33v-23rx-7qqc | 2023-09-25T19:05:49Z | 2022-05-24T16:52:23Z | null | ['CVE-2019-7864'] | Magento 2 Community Edition IDOR Vulnerability | An insecure direct object reference (IDOR) vulnerability exists in the RSS feeds of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can lead to unauthorized access to order details. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7864'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121011306/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-33'}] | {'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:54:19Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-4926-qpxg-6r3w | 2022-06-22T18:29:53Z | 2022-05-24T19:19:03Z | null | ['CVE-2021-22047'] | Exposure of Resource to Wrong Sphere in Spring Data REST | In Spring Data REST versions 3.4.0 - 3.4.13, 3.5.0 - 3.5.5, and older unsupported versions, HTTP resources implemented by custom controllers using a configured base API path and a controller type-level request mapping are additionally exposed under URIs that can potentially be exposed for unauthorized access depending ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-rest-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.13'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springfram... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22047'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22047'}] | {'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:29:53Z', 'nvd_published_at': '2021-10-28T16:15:00Z'} |
1.4.0 | GHSA-vjf8-xw6c-wjhq | 2022-12-20T22:14:19Z | 2022-05-24T17:25:25Z | null | ['CVE-2020-2237'] | CSRF vulnerability in Jenkins Flaky Test Handler Plugin | Flaky Test Handler Plugin 1.0.4 and earlier does not require POST requests for the "Deflake this build" feature, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to rebuild a project at a previous git revision where the tests were failing. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:flaky-test-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2237'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/flaky-test-handler-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1763'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:14:19Z', 'nvd_published_at': '2020-08-12T14:15:00Z'} |
1.4.0 | GHSA-99v3-9x35-c5vf | 2022-07-07T22:34:04Z | 2022-05-13T01:09:20Z | null | ['CVE-2014-3623'] | Improper Authentication in Apache WSS4J | Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does not properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vectors. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ws.security:wss4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.wss4j:wss4j-ws-security-dom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3623'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/97754'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/WSS-511'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327d... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:34:04Z', 'nvd_published_at': '2014-10-30T14:55:00Z'} |
1.4.0 | GHSA-5jc8-8xhv-g8qm | 2022-07-12T22:17:46Z | 2022-05-17T01:38:40Z | null | ['CVE-2012-5817'] | Improper Input Validation in XFire | Codehaus XFire 1.2.6 and earlier, as used in the Amazon EC2 API Tools Java library and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an a... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.xfire:xfire-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5817'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/79934'}, {'type': 'WEB', 'url': 'http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:17:46Z', 'nvd_published_at': '2012-11-04T22:55:00Z'} |
1.4.0 | GHSA-h88f-r7cw-8fv3 | 2022-06-21T20:11:22Z | 2022-05-24T19:14:00Z | null | ['CVE-2021-38540'] | Missing Authentication for Critical Function in Apache Airflow | The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. This issue affects Apache Airf... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38540'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/bcec1df703cd4a01520a90c3f801cca6f97d9bfd'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h88f-r7cw-8fv3'}, {'type': 'PACKAGE', 'url': 'https://github.com/a... | {'cwe_ids': ['CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:11:22Z', 'nvd_published_at': '2021-09-09T15:15:00Z'} |
1.4.0 | GHSA-ggww-q2gv-m3g4 | 2023-07-25T18:25:52Z | 2022-05-14T01:41:09Z | null | ['CVE-2018-19799'] | Dolibarr ERP and CRM contain XSS Vulnerability | Dolibarr ERP/CRM through 8.0.3 has `/exports/export.php?datatoexport=` XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19799'}, {'type': 'WEB', 'url': 'https://pentest.com.tr/exploits/Dolibarr-ERP-CRM-8-0-3-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45945/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:25:52Z', 'nvd_published_at': '2018-12-26T21:29:00Z'} |
1.4.0 | GHSA-pwjq-6wrh-5w8q | 2023-07-24T22:17:36Z | 2022-05-14T01:36:38Z | null | ['CVE-2018-19960'] | OnionShare Predictable Pathname | The `debug_mode` function in `web/web.py` in OnionShare through 1.3.1, when `--debug` is enabled, uses the `/tmp/onionshare_server.log` pathname for logging, which might allow local users to overwrite files or obtain sensitive information by using this pathname. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19960'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/915859'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T22:17:36Z', 'nvd_published_at': '2018-12-07T16:29:00Z'} |
1.4.0 | GHSA-32w9-2qpc-5f9v | 2022-11-01T23:33:48Z | 2022-05-13T01:04:24Z | null | ['CVE-2019-0204'] | Docker image code execution with Apache Mesos | A specifically crafted Docker image running under the root user can overwrite the init helper binary of the container runtime and/or the command executor in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.2, 1.6.0 to 1.6.1, and 1.7.0 to 1.7.1. A malicious actor can therefore gain root-level code execution... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.3'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0204'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c@%3Cdev.mesos.apache.org%3E'}, {'type': 'WEB', '... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:33:48Z', 'nvd_published_at': '2019-03-25T22:29:00Z'} |
1.4.0 | GHSA-q7v2-w38r-pv7v | 2023-08-29T22:35:39Z | 2022-05-17T05:25:11Z | null | ['CVE-2012-4579'] | phpMyAdmin Multiple XSS Vulnerabilities | Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.2.2 allow remote authenticated users to inject arbitrary web script or HTML via a Table Operations (1) TRUNCATE or (2) DROP link for a crafted table name, (3) the Add Trigger popup within a Triggers page that references crafted table nam... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4579'}, {'type': 'WEB', 'url': 'http://www.phpmyadmin.net/home_page/security/PMASA-2012-4.php'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T22:35:39Z', 'nvd_published_at': '2012-08-21T23:55:00Z'} |
1.4.0 | GHSA-hjfh-7c4v-7q8h | 2022-06-17T17:20:31Z | 2022-05-02T03:39:47Z | null | ['CVE-2009-2901'] | Improper Authentication in Apache Tomcat | The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.29'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.5.28'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-2901'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/55856'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'typ... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T17:20:31Z', 'nvd_published_at': '2010-01-28T20:30:00Z'} |
1.4.0 | GHSA-r9jw-mwhq-wp62 | 2022-09-12T14:50:37Z | 2022-05-13T01:42:19Z | null | ['CVE-2017-11424'] | PyJWT vulnerable to key confusion attacks | In PyJWT 1.5.0 and below the `invalid_strings` check in `HMACAlgorithm.prepare_key` does not account for all PEM encoded public keys. Specifically, the PKCS1 PEM encoded format would be allowed because it is prefaced with the string `-----BEGIN RSA PUBLIC KEY-----` which is not accounted for. This enables symmetric/asy... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyjwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11424'}, {'type': 'WEB', 'url': 'https://github.com/jpadilla/pyjwt/pull/277'}, {'type': 'PACKAGE', 'url': 'https://github.com/jpadilla/pyjwt'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3979'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T14:50:37Z', 'nvd_published_at': '2017-08-24T16:29:00Z'} |
1.4.0 | GHSA-c57p-3v2g-w9rg | 2022-07-13T17:26:44Z | 2022-05-14T01:17:03Z | null | ['CVE-2011-2204'] | Insertion of Sensitive Information into Log File in Apache Tomcat | Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file.
This issue was fixed in Apache Tomcat... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2204'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=717013'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/68238'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WE... | {'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:26:44Z', 'nvd_published_at': '2011-06-29T17:55:00Z'} |
1.4.0 | GHSA-fx7f-rjqj-52pj | 2022-06-22T18:24:49Z | 2022-05-24T19:19:03Z | null | ['CVE-2021-22097'] | Deserialization of Untrusted Data in Spring AMQP | In Spring AMQP versions 2.2.0 - 2.2.18 and 2.3.0 - 2.3.10, the Spring AMQP Message object, in its toString() method, will deserialize a body for a message with content type application/x-java-serialized-object. It is possible to construct a malicious java.util.Dictionary object that can cause 100% CPU usage in the appl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp:spring-amqp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.18'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22097'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22097'}] | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:24:49Z', 'nvd_published_at': '2021-10-28T16:15:00Z'} |
1.4.0 | GHSA-wwr4-79jv-297r | 2022-12-06T21:48:30Z | 2022-05-24T16:58:49Z | null | ['CVE-2019-10445'] | Missing permission checks in Google Kubernetes Engine Jenkins Plugin | A missing permission check in Jenkins Google Kubernetes Engine Plugin Prior to version 0.7.1 allows attackers with Overall/Read permission to obtain limited information about the scope of a credential with an attacker-specified credentials ID. This issue is patched in version 0.7.1 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-kubernetes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10445'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-kubernetes-engine-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1607'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:48:30Z', 'nvd_published_at': '2019-10-16T14:15:00Z'} |
1.4.0 | GHSA-793v-r35j-9rp9 | 2023-07-27T23:20:45Z | 2022-05-24T16:48:34Z | null | ['CVE-2016-7404'] | Openstack Magnum Unsafe Credential Handling | OpenStack Magnum passes OpenStack credentials into the Heat templates creating its instances. While these should just be used for retrieving the instances' SSL certificates, they allow full API access, though and can be used to perform any API operation the user is authorized to perform. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'openstack-magnum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7404'}, {'type': 'WEB', 'url': 'https://github.com/openstack/magnum/commit/e93d82e8b3bc19211efd54edc17aebdca50670c1'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/magnum/+bug/1620536'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_... | {'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T23:20:45Z', 'nvd_published_at': '2019-06-21T14:15:00Z'} |
1.4.0 | GHSA-g4rg-993r-mgx7 | 2023-09-11T22:27:13Z | 2022-05-24T19:18:27Z | null | ['CVE-2021-42740'] | Improper Neutralization of Special Elements used in a Command in Shell-quote | The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with `exec()`, an attacker can inject arbi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'shell-quote'}, 'ecosystem_specific': {'affected_functions': ['shell-quote.quote']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42740'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/shell-quote/commit/5799416ed454aa4ec9afafc895b4e31760ea1abe'}, {'type': 'PACKAGE', 'url': 'https://github.com/ljharb/shell-quote'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/shell-q... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:08:10Z', 'nvd_published_at': '2021-10-21T15:15:00Z'} |
1.4.0 | GHSA-rf7h-9m85-535v | 2022-12-12T16:29:27Z | 2022-05-14T02:21:29Z | null | ['CVE-2018-1999038'] | Jenkins Publisher Over CIFS Plugin confused deputy vulnerability | A confused deputy vulnerability exists in Jenkins Publisher Over CIFS Plugin 0.10 and earlier in CifsPublisherPluginDescriptor.java that allows attackers to have Jenkins connect to an attacker specified CIFS server with attacker specified credentials. Additionally, this form validation method did not require POST reque... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-cifs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999038'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-cifs-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-30/#SECURITY-975'}] | {'cwe_ids': ['CWE-441'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:29:27Z', 'nvd_published_at': '2018-08-01T13:29:00Z'} |
1.4.0 | GHSA-4c42-4rxm-x6qf | 2023-08-17T23:30:35Z | 2022-05-17T04:53:45Z | null | ['CVE-2013-1443'] | Django Denial of Service Vulnerability in the authentication framework | The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'typ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1443'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/22b74fa09d7ccbc8c52270d648a0da7f3f0fa2bc'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/3f3d887a6844ec2db743fee64c9e53e04d39a368'}, {'type': 'PACKAGE', 'url... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T23:30:35Z', 'nvd_published_at': '2013-09-23T20:55:00Z'} |
1.4.0 | GHSA-84cw-mxhv-qvv4 | 2023-08-02T22:33:28Z | 2022-05-17T03:43:03Z | null | ['CVE-2016-1505'] | Radicale is vulnerable to directory traversal on Windows Filesystem Storage Backend component | The filesystem storage backend in Radicale before 1.1 on Windows allows remote attackers to read or write to arbitrary files via a crafted path, as demonstrated by /c:/file/ignore. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Radicale'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1505'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/Radicale/pull/343'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/Radicale/commit/b4b3d51f33c7623d312f289252dd7bbb8f58bbe6'}, {'type': 'PACKAGE', 'url': 'https://github.com/Kozea/Radicale... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T22:33:28Z', 'nvd_published_at': '2016-02-03T18:59:00Z'} |
1.4.0 | GHSA-x24q-xwrf-66jm | 2022-07-08T19:18:52Z | 2022-05-17T01:58:13Z | null | ['CVE-2013-4204'] | Improper Neutralization of Input During Web Page Generation in Google Web Toolkit | Multiple cross-site scripting (XSS) vulnerabilities in the JUnit files in the GWTTestCase in Google Web Toolkit (GWT) before 2.5.1 RC1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.google.gwt:gwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4204'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-4204'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=992911'}, {'type': 'WEB', 'url': 'http://www.gwtproject.org/release-notes.html#Release_Notes... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:18:52Z', 'nvd_published_at': '2013-11-18T02:55:00Z'} |
1.4.0 | GHSA-fcgg-rvwg-jv58 | 2022-11-21T19:45:47Z | 2022-05-26T00:01:27Z | null | ['CVE-2022-30321'] | HashiCorp go-getter unsafe downloads | HashiCorp go-getter through 2.0.2 does not safely perform downloads. Protocol switching, endless redirect, and configuration bypass were possible via abuse of custom HTTP response header processing. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30321'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/pull/359'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/pull/361'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/38e97387488f5439616... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:20:37Z', 'nvd_published_at': '2022-05-25T12:15:00Z'} |
1.4.0 | GHSA-8r7q-cvjq-x353 | 2022-07-07T22:50:31Z | 2022-05-14T04:04:14Z | null | ['CVE-2014-1402'] | Incorrect Privilege Assignment in Jinja2 | The default configuration for bccache.FileSystemBytecodeCache in Jinja2 before 2.7.2 does not properly create temporary files, which allows local users to gain privileges via a crafted .cache file with a name starting with __jinja2_ in /tmp. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Jinja2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1402'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1051421'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8r7q-cvjq-x35... | {'cwe_ids': ['CWE-266'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:50:31Z', 'nvd_published_at': '2014-05-19T14:55:00Z'} |
1.4.0 | GHSA-8qxp-g8jv-p37x | 2022-11-02T00:42:59Z | 2022-05-13T01:05:22Z | null | ['CVE-2019-1003004'] | Improper Authorization in Jenkins Core | An improper authorization vulnerability exists in Jenkins 2.158 and earlier, LTS 2.150.1 and earlier in core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java that allows attackers to extend the duration of active HTTP sessions indefinitely even though the user account may have been deleted in the mean... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.159'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003004'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0327'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-01-16/#SECURITY-901'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106680'}] | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:42:59Z', 'nvd_published_at': '2019-01-22T14:29:00Z'} |
1.4.0 | GHSA-p9vf-4jx2-5hpp | 2023-09-26T18:50:25Z | 2022-05-24T17:00:24Z | null | ['CVE-2019-8112'] | Magento 2 Community Edition Security Bypass | A security bypass vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An unauthenticated user can bypass the email confirmation mechanism via GET request that captures relevant account data obtained from the POST response related to new user creation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8112'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:02:18Z', 'nvd_published_at': '2019-11-05T23:15:00Z'} |
1.4.0 | GHSA-36c3-jcm2-rm3j | 2023-07-28T20:32:58Z | 2022-05-14T02:22:45Z | null | ['CVE-2016-7194'] | ChakraCore RCE Vulnerability | The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3386, CVE-2016-3389, and CVE-2016-7190. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7194'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-119'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210623180451/http://www.securityfocus.com/bid/93399'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:32:58Z', 'nvd_published_at': '2016-10-14T02:59:00Z'} |
1.4.0 | GHSA-4cmq-88f8-53r5 | 2022-12-06T21:25:47Z | 2022-05-24T16:58:49Z | null | ['CVE-2019-10439'] | Jenkins CRX Content Package Deployer Plugin subject to credentials enumeration via Missing Authorization | A missing permission check in Jenkins CRX Content Package Deployer Plugin prior to version 1.9 in various 'doFillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. This issue is patched in version 1.9. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:crx-content-package-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10439'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/crx-content-package-deployer-plugin/commit/06cd0e7e1b3f2fb87b3fa332ee1da710ca94b8e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/crx-content-package-deployer-plugin/'}, {'... | {'cwe_ids': ['CWE-285', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:25:47Z', 'nvd_published_at': '2019-10-16T14:15:00Z'} |
1.4.0 | GHSA-qh9x-mc42-vg4g | 2022-07-27T21:33:52Z | 2022-05-14T03:32:28Z | null | ['CVE-2018-1000089'] | django-anymail Includes Sensitive Information in Log Files | Anymail django-anymail version version 0.2 through 1.3 contains a CWE-532, CWE-209 vulnerability in WEBHOOK_AUTHORIZATION setting value that can result in An attacker with access to error logs could fabricate email tracking events. This attack appear to be exploitable via If you have exposed your Django error reports, ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-anymail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2'}, {'fixed': '1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000089'}, {'type': 'WEB', 'url': 'https://github.com/anymail/django-anymail/commit/1a6086f2b58478d71f89bf27eb034ed81aefe5ef'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qh9x-mc42-vg4g'}, {'type': 'PACKAGE', 'url': 'https://gi... | {'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T21:33:52Z', 'nvd_published_at': '2018-03-13T15:29:00Z'} |
1.4.0 | GHSA-qgrq-64g6-mmh6 | 2023-07-31T21:46:10Z | 2022-05-17T02:36:36Z | null | ['CVE-2016-9863'] | phpMyAdmin DoS Vulnerability | An issue was discovered in phpMyAdmin. With a very large request to table partitioning function, it is possible to invoke a Denial of Service (DoS) attack. All 4.6.x versions (prior to 4.6.5) are affected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9863'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123194704/http://www.securityfocus.com/bid/94526'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/P... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:46:10Z', 'nvd_published_at': '2016-12-11T03:00:00Z'} |
1.4.0 | GHSA-94hc-7qc9-34rf | 2023-07-26T22:35:58Z | 2022-05-14T03:41:55Z | null | ['CVE-2017-1000507'] | Canvs Canvas XSS Vulnerability | Canvs Canvas version 3.4.2 contains a Cross Site Scripting (XSS) vulnerability in User's details that can result in denial of service and execution of javascript code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'austintoddj/canvas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000507'}, {'type': 'WEB', 'url': 'https://github.com/cnvs/canvas/issues/359'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T22:35:58Z', 'nvd_published_at': '2018-02-09T23:29:00Z'} |
1.4.0 | GHSA-hv45-5j9h-7fhg | 2022-06-30T17:22:32Z | 2022-05-14T01:04:36Z | null | ['CVE-2018-1000407'] | Cross-site Scripting in Jenkins | A cross-site scripting vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/Api.java that allows attackers to specify URLs to Jenkins that result in rendering arbitrary attacker-controlled HTML by Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.138.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.138.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000407'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/df87e12ddcfeafdba6e0de0e07b3e21f8473ece6'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-10-10/#SECURITY-1129'}, {'type': 'WEB', 'url': 'http://www.... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T17:22:32Z', 'nvd_published_at': '2019-01-09T23:29:00Z'} |
1.4.0 | GHSA-384c-gg34-g96h | 2022-07-06T19:51:48Z | 2022-05-01T17:42:17Z | null | ['CVE-2007-0184'] | Incorrect Authorization in Getahead Direct Web Remoting | Getahead Direct Web Remoting (DWR) before 1.1.4 allows attackers to obtain unauthorized access to public methods via a crafted request that bypasses the include/exclude checks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.directwebremoting:dwr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-0184'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/31377'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html'}] | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:51:48Z', 'nvd_published_at': '2007-01-12T05:04:00Z'} |
1.4.0 | GHSA-8rfc-v3vj-j62w | 2022-11-22T19:09:14Z | 2022-05-24T17:03:49Z | null | ['CVE-2019-16574'] | Jenkins Alauda DevOps Pipeline Plugin allows attackers with Overall/Read permission to capture credentials stored in Jenkins | A missing permission check in Jenkins Alauda DevOps Pipeline Plugin 2.3.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.alauda.jenkins.plugins:alauda-devops-pipeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16574'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1600'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}] | {'cwe_ids': ['CWE-285', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:09:14Z', 'nvd_published_at': '2019-12-17T15:15:00Z'} |
1.4.0 | GHSA-2m5h-6g38-jjf2 | 2023-09-28T20:18:37Z | 2022-05-13T01:21:17Z | null | ['CVE-2019-0568'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2019-0539, CVE-2019-0567. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0568'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d73c5f12d9c5cbbf64f59ae04e76a531b3e844b3'}, {'type': 'PACKAGE', 'url': 'https://github.com/chakra-core/ChakraCore'}, {'type': 'WEB', 'url': 'https://portal.msrc.micros... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T20:21:04Z', 'nvd_published_at': '2019-01-08T21:29:00Z'} |
1.4.0 | GHSA-g2vx-8v47-4vhh | 2023-01-14T05:29:31Z | 2022-05-17T05:44:11Z | null | ['CVE-2010-4335'] | CakePHP allows remote attackers to modify internal Cake cache and execute arbitrary code | The `_validatePost` function in `libs/controller/components/security.php` in CakePHP 1.3.x through 1.3.5 and 1.2.8 allows remote attackers to modify the internal Cake cache and execute arbitrary code via a crafted `data[_Token][fields]` value that is processed by the unserialize function, as demonstrated by modifying t... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.8'}, {'fixed': '1.3.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-4335'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}, {'type': 'WEB', 'url': 'http://malloc.im/CakePHP-unserialize.txt... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:29:31Z', 'nvd_published_at': '2011-01-14T23:00:00Z'} |
1.4.0 | GHSA-hf26-vvmx-x8c8 | 2023-09-22T21:57:47Z | 2022-05-01T18:36:14Z | null | ['CVE-2007-5741'] | Plone Arbitrary Code Execution via Unsafe Handling of Pickles | Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrary Python code via network data containing pickled objects for the (1) statusmessages or (2) linkintegrity module, which the module unpickles and executes. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5'}, {'fixed': '2.5.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.4'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5741'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/38288'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080507055819/https://plone.org/about/security/advisories/cve-2007-5741'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:57:47Z', 'nvd_published_at': '2007-11-07T21:46:00Z'} |
1.4.0 | GHSA-r4rv-cq77-6p24 | 2023-02-02T23:26:11Z | 2022-05-24T16:51:50Z | null | ['CVE-2019-10359'] | Jenkins Maven Release Plugin contains Cross-Site Request Forgery vulnerability | A cross-site request forgery vulnerability in Jenkins Maven Release Plugin prior to 0.15.0 in the M2ReleaseAction#doSubmit method allowed attackers to perform releases with attacker-specified options. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.m2release:m2release'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10359'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/m2release-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T23:26:11Z', 'nvd_published_at': '2019-07-31T13:15:00Z'} |
1.4.0 | GHSA-jmg4-x4vp-6c6x | 2022-11-08T14:16:18Z | 2022-05-13T01:18:20Z | null | ['CVE-2017-15695'] | Apache Geode vulnerable to Incorrect Authorization | When an Apache Geode server versions 1.0.0 to 1.4.0 is configured with a security manager, a user with DATA:WRITE privileges is allowed to deploy code by invoking an internal Geode function. This allows remote code execution. Code deployment should be restricted to users with DATA:MANAGE privilege. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15695'}, {'type': 'WEB', 'url': 'https://github.com/apache/geode/pull/1258'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/GEODE/Release+Notes#ReleaseNotes-SecurityVulnerabilities'}, {'type': 'WEB', 'url': 'https://issues.apa... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:16:18Z', 'nvd_published_at': '2018-06-13T17:29:00Z'} |
1.4.0 | GHSA-cjcf-wm2p-59h5 | 2022-07-01T17:10:39Z | 2022-05-13T01:45:42Z | null | ['CVE-2017-3589'] | Exposure of Sensitive Information to an Unauthorized Actor in Oracle MySQL Connectors Java | Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Suc... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'mysql:mysql-connector-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.42'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.41'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3589'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3857'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:10:39Z', 'nvd_published_at': '2017-04-24T19:59:00Z'} |
1.4.0 | GHSA-9m82-f3wx-p625 | 2023-07-25T17:54:38Z | 2022-05-14T01:53:39Z | null | ['CVE-2018-18478'] | LibreNMS XSS Vulnerability | Persistent Cross-Site Scripting (XSS) issues in LibreNMS before 1.44 allow remote attackers to inject arbitrary web script or HTML via the dashboard_name parameter in the /ajax_form.php resource, related to html/includes/forms/add-dashboard.inc.php, html/includes/forms/delete-dashboard.inc.php, and html/includes/forms/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.44'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18478'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/issues/9170'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/9171'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/releases/tag/1.44'}, {'type'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T17:54:38Z', 'nvd_published_at': '2018-10-18T17:29:00Z'} |
1.4.0 | GHSA-qx32-f6g6-fcfr | 2023-08-29T17:53:16Z | 2022-05-22T00:00:32Z | null | ['CVE-2022-31259'] | Access control bypass in beego | The route lookup process in beego prior to 1.12.9 and 2.x prior to 2.0.3 allows attackers to bypass access control. When a /`p1`/`p2`/`:name` route is configured, attackers can access it by appending .xml in various places (e.g., p1.xml instead of p1). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego'}, 'ecosystem_specific': {'affected_function... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31259'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/issues/4946'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/4954'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/4958'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:35:48Z', 'nvd_published_at': '2022-05-21T19:15:00Z'} |
1.4.0 | GHSA-hfpg-gqjw-779m | 2022-06-30T18:25:33Z | 2022-05-14T01:27:45Z | null | ['CVE-2018-1000129'] | Cross-site Scripting in Jolokia agent | An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jolokia:jolokia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.7'}, {'fixed': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000129'}, {'type': 'WEB', 'url': 'https://github.com/rhuss/jolokia/commit/5895d5c137c335e6b473e9dcb9baf748851bbc5f#diff-f19898247eddb55de6400489bff748ad'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T18:25:33Z', 'nvd_published_at': '2018-03-14T13:29:00Z'} |
1.4.0 | GHSA-28rm-rj57-qjpv | 2023-09-25T14:11:44Z | 2022-05-17T04:42:46Z | null | ['CVE-2014-2054'] | PHPExcel vulnerable to XXE attacks through libxml | PHPExcel before 1.8.0, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, does not disable external entity loading in libxml, which allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpoffice/phpexcel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2054'}, {'type': 'WEB', 'url': 'https://github.com/PHPOffice/PHPExcel/commit/e04bf7ed091b0a72d028eacf26d770b485d4e897'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPOffice/PHPExcel'}, {'type': 'WEB', 'url': 'https://github.com/PHPOffice/PHPEx... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-25T14:11:44Z', 'nvd_published_at': '2014-06-04T14:55:00Z'} |
1.4.0 | GHSA-h6c8-x5r3-pm88 | 2023-08-17T22:16:37Z | 2022-05-13T01:12:13Z | null | ['CVE-2013-4444'] | Apache Tomcat Unrestricted file upload vulnerability | Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0'}, {'fixed': '7.0.40'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4444'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archiv... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:16:37Z', 'nvd_published_at': '2014-09-12T01:55:00Z'} |
1.4.0 | GHSA-xf37-qcvf-7m57 | 2023-09-04T16:56:18Z | 2022-05-24T19:13:30Z | null | ['CVE-2021-22004'] | Improper Authentication in SaltStack Salt | An issue was discovered in SaltStack Salt before 3003.3. The salt minion installer will accept and use a minion config file at C:\salt\conf if that file is in place before the installer is run. This allows for a malicious actor to subvert the proper behaviour of the given minion software. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3003.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22004'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xf37-qcvf-7m57'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2021-346.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:42:48Z', 'nvd_published_at': '2021-09-08T15:15:00Z'} |
1.4.0 | GHSA-vc3x-72q4-g3p5 | 2022-11-04T18:42:12Z | 2022-05-13T01:36:17Z | null | ['CVE-2017-7545'] | XML External Entity Reference in jbpmmigration | It was discovered that the XmlUtils class in jbpmmigration performed expansion of external parameter entities while parsing XML files. A remote attacker could use this flaw to read files accessible to the user running the application server and, potentially, perform other more advanced XML eXternal Entity (XXE) attacks... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jbpm.jbpm5:jbpmmigration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7545'}, {'type': 'WEB', 'url': 'https://github.com/kiegroup/jbpm-designer/commit/a143f3b92a6a5a527d929d68c02a0c5d914ab81d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3354'}, {'type': 'WEB', 'url': 'https://access.redhat.co... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:42:12Z', 'nvd_published_at': '2018-07-26T15:29:00Z'} |
1.4.0 | GHSA-3f57-w2rp-72fc | 2022-11-08T12:43:33Z | 2022-05-17T00:15:06Z | null | ['CVE-2016-7046'] | Undertow Uncaught Exception vulnerability | A long URL proxy request lead to java.nio.BufferOverflowException in Undertow. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7046'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/c518b5a1784061d807efedcef0a03fcd35a53de2'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1376646'}, {'type': 'PACKAGE', 'url': 'https://github.com... | {'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T12:43:33Z', 'nvd_published_at': '2016-10-03T21:59:00Z'} |
1.4.0 | GHSA-3wcj-rg8q-9cqv | 2022-07-08T19:21:47Z | 2022-05-14T03:47:22Z | null | ['CVE-2017-11879'] | Open redirect in ASP.NET Core | ASP.NET Core 2.0 allows an attacker to steal log-in session information such as cookies or authentication tokens via a specially crafted URL aka "ASP.NET Core Elevation Of Privilege Vulnerability". | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11879'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/277'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidan... | {'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:21:47Z', 'nvd_published_at': '2017-11-15T03:29:00Z'} |
1.4.0 | GHSA-4xf6-xr96-7vmp | 2023-08-16T23:18:11Z | 2022-05-17T04:42:00Z | null | ['CVE-2014-3995'] | Djblets Cross-site scripting Vulnerability | A cross-site scripting (XSS) vulnerability in `gravatars/templatetags/gravatars.py` in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django allows remote attackers to inject arbitrary web script or HTML via a user display name. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'djblets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.30'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'djblets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3995'}, {'type': 'WEB', 'url': 'https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd'}, {'type': 'WEB', 'url': 'https://github.com/djblets/djblets/commit/77ac64642ad530bf69e390c51fc6fdcb8914c8e7'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:18:11Z', 'nvd_published_at': '2014-06-16T18:55:00Z'} |
1.4.0 | GHSA-wrrh-g7h3-gqmx | 2022-07-13T18:42:09Z | 2022-05-17T01:49:58Z | null | ['CVE-2012-0818'] | Exposure of Sensitive Information to an Unauthorized Actor in RESTEasy | RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0818'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/resteasy/commit/71ace879cf92d323bfa4d3e88db0c3059109bbf6'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2012:0421'}, {'type': 'WEB', 'url': 'https://access.redhat.com/err... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:42:09Z', 'nvd_published_at': '2012-11-23T20:55:00Z'} |
1.4.0 | GHSA-73rx-3f9r-x949 | 2022-06-30T21:22:02Z | 2022-05-14T01:10:15Z | null | ['CVE-2017-7674'] | Insufficient Verification of Data Authenticity in Apache Tomcat | The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M21'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7674'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/52382ebfbce20a98b01cd9d37184a12703987a5a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1801'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/... | {'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T21:22:02Z', 'nvd_published_at': '2017-08-11T02:29:00Z'} |
1.4.0 | GHSA-279p-pc38-xx4p | 2022-05-25T19:21:15Z | 2022-05-25T19:21:15Z | null | ['CVE-2019-17352'] | JFinal file validation vulnerability | In JFinal cos before 2019-08-13, as used in JFinal 4.4, there is a vulnerability that can bypass the isSafeFile() function: one can upload any type of file. For example, a .jsp file may be stored and almost immediately deleted, but this deletion step does not occur for certain exceptions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.jfinal:jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17352'}, {'type': 'WEB', 'url': 'https://github.com/jfinal/jfinal/issues/171'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/jfinal/cos'}, {'type': 'WEB', 'url': 'https://gitee.com/jfinal/cos/commit/5eb23d6e384abaad19faa7600d14c9a2f525946a'}, {'ty... | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:21:15Z', 'nvd_published_at': '2019-10-08T13:15:00Z'} |
1.4.0 | GHSA-5pg8-f89x-wjcx | 2023-01-14T05:22:47Z | 2022-05-24T17:10:28Z | null | ['CVE-2020-2143'] | Credentials transmitted in plain text by Jenkins Logstash Plugin | Logstash Plugin stores credentials in its global configuration file `jenkins.plugins.logstash.LogstashConfiguration.xml` on the Jenkins controller as part of its configuration.
While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Logstash Plugin 2.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:logstash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2143'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/logstash-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1516'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03... | {'cwe_ids': ['CWE-319'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:22:47Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
1.4.0 | GHSA-cwq3-qp8v-w8q3 | 2023-09-18T23:46:51Z | 2022-05-01T02:20:38Z | null | ['CVE-2005-3747'] | Mortbay Jetty Discloses JSP Source Code | Unspecified vulnerability in Jetty before 5.1.6 allows remote attackers to obtain source code of JSP pages, possibly involving requests for .jsp files with URL-encoded backslash (`%5C`) characters. NOTE: this might be the same issue as CVE-2006-2758. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2005-3747'}, {'type': 'WEB', 'url': 'http://sourceforge.net/project/shownotes.php?release_id=372086&group_id=7322'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/450315/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T23:46:51Z', 'nvd_published_at': '2005-11-22T11:03:00Z'} |
1.4.0 | GHSA-jpvq-v729-7j2h | 2022-06-23T23:19:33Z | 2022-05-24T17:25:24Z | null | ['CVE-2020-2231'] | Improper Neutralization of Input During Web Page Generation in Jenkins | Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the remote address of the host starting a build via 'Trigger builds remotely', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission or knowledge of the Authentication Token. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.235.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.235.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2231'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1960'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160616/Jenkins-2.251-LTS-2.235.3-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T23:19:33Z', 'nvd_published_at': '2020-08-12T14:15:00Z'} |
1.4.0 | GHSA-fg3x-rwq9-74cw | 2023-07-25T19:19:22Z | 2022-05-14T02:20:32Z | null | ['CVE-2018-15192'] | Gogs and Gitea SSRF Vulnerability | An SSRF vulnerability in webhooks in Gitea through 1.5.0-rc2 and Gogs through 0.11.53 allows remote attackers to access intranet services. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.0-rc2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.53'}]}]}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15192'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/4624'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/5366'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:19:22Z', 'nvd_published_at': '2018-08-08T02:29:00Z'} |
1.4.0 | GHSA-66cr-6whx-732p | 2023-02-03T23:24:51Z | 2022-05-17T03:53:35Z | null | ['CVE-2014-3665'] | Jenkins improperly ensures trust separation | Jenkins prior to 1.587 and LTS before 1.580.1 do not properly ensure trust separation between a master and slaves, which might allow remote attackers to execute arbitrary code on the master by leveraging access to the slave. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.587'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3665'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2014:1630'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-3665'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1147767'}, {'type... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-03T23:24:51Z', 'nvd_published_at': '2015-11-25T20:59:00Z'} |
1.4.0 | GHSA-g4rw-82hq-8jpr | 2023-07-26T20:22:18Z | 2022-05-13T01:54:14Z | null | ['CVE-2017-1000426'] | MapProxy CSRF Vulnerability | MapProxy version 1.10.3 and older is vulnerable to a Cross Site Scripting attack in the demo service resulting in possible information disclosure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'MapProxy'}, 'ecosystem_specific': {'affected_functions': ['escape']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000426'}, {'type': 'WEB', 'url': 'https://github.com/mapproxy/mapproxy/issues/322'}, {'type': 'WEB', 'url': 'https://github.com/mapproxy/mapproxy/commit/420412aad45171e05752007a0a2350c03c28dfd8'}, {'type': 'WEB', 'url': 'https://github.com/mapprox... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T20:22:18Z', 'nvd_published_at': '2018-01-02T21:29:00Z'} |
1.4.0 | GHSA-735f-mx7h-46w8 | 2023-07-27T19:46:38Z | 2022-05-17T00:11:59Z | null | ['CVE-2017-11910'] | ChakraCore RCE Vulnerability | ChakraCore and Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, C... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11910'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4411'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/40232a443c6316a58941572b0a4776b0677975ca'}, {'type': 'WEB', 'url': 'https://portal.msrc... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:46:38Z', 'nvd_published_at': '2017-12-12T21:29:00Z'} |
1.4.0 | GHSA-9848-v244-962p | 2023-08-14T23:23:18Z | 2022-05-14T02:21:24Z | null | ['CVE-2012-1007'] | Apache Struts XSS | Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 1.3.10 allow remote attackers to inject arbitrary web script or HTML via (1) the name parameter to struts-examples/upload/upload-submit.do, or the message parameter to (2) `struts-cookbook/processSimple.do` or (3) `struts-cookbook/processDyna.do`. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1007'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/73052'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T21:09:51Z', 'nvd_published_at': '2012-02-07T04:09:00Z'} |
1.4.0 | GHSA-qpg9-83fv-x9ch | 2022-06-29T13:30:25Z | 2022-05-13T01:01:01Z | null | ['CVE-2019-1003050'] | Improper Neutralization of Input During Web Page Generation in Jenkins | The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.164.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.164.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003050'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/8eb632dda219ec8796420ce58d9564cddf8f8f93'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/d393c7e9ba3ec44953ef1f8b11839421e2649ee7'}, {'type': 'WEB... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T13:30:25Z', 'nvd_published_at': '2019-04-10T21:29:00Z'} |
1.4.0 | GHSA-xc7q-q62f-wcvr | 2023-08-29T18:50:33Z | 2022-05-17T04:58:35Z | null | ['CVE-2013-6289'] | Apache Solr for TYPO3 (solr) extension is vulnerable to Cross-site scripting (XSS) | Cross-site scripting (XSS) vulnerability in the Apache Solr for TYPO3 (solr) extension before 2.8.3 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'apache-solr-for-typo3/solr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6289'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3-Solr/ext-solr/commit/57e3b06b498668e093b9b86f32f7509d12d6ae4e'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3-Solr/ext-solr/commit/7ed1e9fc03f2036d80a416178493da72c620f7e9'}, {'type': 'PA... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:50:33Z', 'nvd_published_at': '2013-10-28T22:55:00Z'} |
1.4.0 | GHSA-75p2-hgw4-g7f7 | 2023-09-26T20:43:47Z | 2022-05-24T17:12:10Z | null | ['CVE-2019-20627'] | AutoUpdater.NET allows XXE | AutoUpdater.cs in AutoUpdater.NET before 1.5.8 allows XXE. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Autoupdater.NET.Official'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20627'}, {'type': 'WEB', 'url': 'https://github.com/ravibpatel/AutoUpdater.NET/commit/1dc25f2bea6ea522dbac1512b5563c4746d539c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ravibpatel/AutoUpdater.NET'}, {'type': 'WEB', 'url': 'https://github.co... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:29:18Z', 'nvd_published_at': '2020-03-23T17:15:00Z'} |
1.4.0 | GHSA-j762-mr2c-fmp9 | 2023-07-20T18:20:56Z | 2022-05-13T01:18:33Z | null | ['CVE-2018-0838'] | ChakraCore RCE Vulnerability | Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0838'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f82e7b4e561494a9ad79f2fe5c5aadcdf6ccce33'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0838'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:20:56Z', 'nvd_published_at': '2018-02-15T02:29:00Z'} |
1.4.0 | GHSA-538h-6rv2-wmj3 | 2023-07-31T20:28:04Z | 2022-05-14T02:24:33Z | null | ['CVE-2016-3214'] | ChakraCore RCE Vulnerability | The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3199. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3214'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/0b9f3cdd57cb09388fcf898edc537169c45a7345'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-068'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T20:28:04Z', 'nvd_published_at': '2016-06-16T01:59:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.