schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-3wfj-vh84-732p
2022-07-07T22:40:47Z
2022-05-14T01:14:52Z
null
['CVE-2014-3576']
Improper Neutralization of Special Elements used in an OS Command in Apache ActiveMQ
The processControlCommand function in broker/TransportConnection.java in Apache ActiveMQ before 5.11.0 allows remote attackers to cause a denial of service (shutdown) via a shutdown command.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3576'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq/commit/00921f2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E'}, {'type':...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:40:47Z', 'nvd_published_at': '2015-08-14T18:59:00Z'}
1.4.0
GHSA-hp5f-qqrw-c8gj
2023-07-11T18:24:03Z
2022-05-24T22:28:42Z
null
['CVE-2021-37939']
Kibana Sensitive Data Disclosure
It was discovered that Kibana’s JIRA connector & IBM Resilient connector could be used to return HTTP response data on internal hosts, which may be intentionally hidden from public view. Using this vulnerability, a malicious user with the ability to create connectors, could utilize these connectors to view limited HTTP...
[]
[{'package': {'ecosystem': 'npm', 'name': 'kibana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.8.0'}, {'fixed': '7.15.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.15.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37939'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/kibana-7-15-2-security-update/288923'}]
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T18:24:03Z', 'nvd_published_at': '2021-11-18T16:15:00Z'}
1.4.0
GHSA-4wpp-w5r4-7v5v
2022-05-24T20:55:22Z
2022-05-24T20:55:22Z
null
['CVE-2022-29180']
Server-Side Request Forgery in charm
We've discovered a vulnerability in which attackers could forge HTTP requests to manipulate the `charm` data directory to access or delete anything on the server. This has been patched in https://github.com/charmbracelet/charm/commit/3c90668f955c7ce5ef721e4fc9faee7053232fd3 and is available in release [v0.12.1](https:/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/charmbracelet/charm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.12.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/charmbracelet/charm/security/advisories/GHSA-4wpp-w5r4-7v5v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29180'}, {'type': 'WEB', 'url': 'https://github.com/charmbracelet/charm/commit/3c90668f955c7ce5ef721e4fc9faee7053232fd3'}, {'type': 'PACKAGE',...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T20:55:22Z', 'nvd_published_at': '2022-05-07T04:15:00Z'}
1.4.0
GHSA-h6p6-fc4w-cqhx
2022-07-06T21:05:00Z
2022-05-17T04:15:16Z
null
['CVE-2014-7816']
Improper Limitation of a Pathname to a Restricted Directory in JBoss Undertow
Directory traversal vulnerability in JBoss Undertow 1.0.x before 1.0.17, 1.1.x before 1.1.0.CR5, and 1.2.x before 1.2.0.Beta3, when running on Windows, allows remote attackers to read arbitrary files via a .. (dot dot) in a resource URI.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0.Beta1'}, {'fi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7816'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1157478'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/UNDERTOW-338'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/WFLY-4020'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:05:00Z', 'nvd_published_at': '2014-12-01T15:59:00Z'}
1.4.0
GHSA-9qf9-28h9-hqcj
2022-11-04T18:40:40Z
2022-05-13T01:02:43Z
null
['CVE-2017-8046']
Remote code execution in PATCH requests in Spring Data REST
Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) can use specially crafted JSON data to run arbitrary Java code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-rest-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.9.RELEASE'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-rest-core'}, 'ranges': [{'type': 'ECOSYSTEM', '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8046'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-data-rest/issues/1487'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-data-rest/issues/1520'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/R...
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:40:40Z', 'nvd_published_at': '2018-01-04T06:29:00Z'}
1.4.0
GHSA-6fxv-38xc-h866
2023-02-03T00:19:58Z
2022-05-02T03:12:28Z
null
['CVE-2009-0026']
Apache Jackrabbit contains Cross-site Scripting
Multiple cross-site scripting (XSS) vulnerabilities in Apache Jackrabbit before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the q parameter to (1) search.jsp or (2) swr.jsp.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-0026'}, {'type': 'WEB', 'url': 'https://github.com/apache/jackrabbit/commit/36330ae8df40ceaddf9f3f95b8d4855b54921579'}, {'type': 'WEB', 'url': 'https://github.com/apache/jackrabbit/commit/fbdcc02bc35db1d23b527da7bc411087ef29bf1f'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-03T00:19:58Z', 'nvd_published_at': '2009-01-21T20:30:00Z'}
1.4.0
GHSA-4xq9-vw89-p5cx
2023-01-23T14:41:58Z
2022-05-17T04:55:27Z
null
['CVE-2013-7224']
Fat Free CRM allows remote attackers to obtain sensitive information via a direct request
Fat Free CRM before 0.12.1 does not restrict JSON serialization, which allows remote attackers to obtain sensitive information via a direct request, as demonstrated by a request for `users/1.json`.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7224'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/issues/300'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/cf26a04b356ad2161c4c6160260eb870a3de5328'}, {'type': 'PACKAGE', 'url': 'https://githu...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T14:41:58Z', 'nvd_published_at': '2014-01-02T14:59:00Z'}
1.4.0
GHSA-cvvx-r33m-v7pq
2022-07-06T20:28:01Z
2022-05-14T03:15:11Z
null
['CVE-2015-0899']
Improper Input Validation in Apache Struts
The MultiPageValidator implementation in Apache Struts 1 1.1 through 1.3.10 allows remote attackers to bypass intended access restrictions via a modified page parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1'}, {'last_affected': '1.3.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0899'}, {'type': 'WEB', 'url': 'https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-EN'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180629-0006/'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN86448949/index.html'},...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:28:01Z', 'nvd_published_at': '2016-07-04T22:59:00Z'}
1.4.0
GHSA-9xwq-72vp-5j3c
2022-11-04T18:44:51Z
2022-05-17T01:17:22Z
null
['CVE-2017-3152']
Cross-site Scripting in Apache Atlas
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to DOM XSS in the edit-tag functionality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:atlas-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1-incubating'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3152'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/atlas'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4a4fef91e067fd0d9da569e30867c1fa65e2a0520acde71ddefee0ea@%3Cdev.atlas.apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:44:51Z', 'nvd_published_at': '2017-08-29T20:29:00Z'}
1.4.0
GHSA-j249-ghv5-7mxv
2023-08-15T20:17:38Z
2022-05-24T16:50:40Z
null
['CVE-2019-13509']
Secret insertion into debug log in Docker
In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially appli...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.09.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13509'}, {'type': 'WEB', 'url': 'https://docs.docker.com/engine/release-notes/18.09/'}]
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:17:38Z', 'nvd_published_at': '2019-07-18T16:15:00Z'}
1.4.0
GHSA-67q3-gwww-pm4g
2022-11-22T18:57:02Z
2022-05-17T02:28:11Z
null
['CVE-2017-7664']
Apache OpenMeetings does not correctly validate uploaded XML documents
Uploaded XML documents were not correctly validated in Apache OpenMeetings 3.1.0. The issue is fixed in version 3.3.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7664'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/cwr552iapmhukb45'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99576'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:02Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-6jp2-hggx-8j7p
2022-12-12T20:58:11Z
2022-05-17T00:29:00Z
null
['CVE-2017-1000087']
Jenkins GitHub Branch Source Plugin allows any user with Overall/Read permission to get list of valid credentials IDs
GitHub Branch Source provides a list of applicable credential IDs to allow users configuring a job to select the one they'd like to use. This functionality did not check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those could be used as part of an attack to captur...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:github-branch-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0-alpha-1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000087'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/github-branch-source-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-07-10/'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T20:58:11Z', 'nvd_published_at': '2017-10-05T01:29:00Z'}
1.4.0
GHSA-q8qq-2p5p-rg44
2022-12-16T22:55:37Z
2022-05-24T17:17:14Z
null
['CVE-2020-2185']
Missing SSH host key validation in Amazon EC2 Plugin
Amazon EC2 Plugin 1.50.1 and earlier does not use SSH host key validation when connecting to agents. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections to build agents. Amazon EC2 Plugin 1.50.2 provides strategies for performing host key validation for administrator...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.50.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.50.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2185'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-05-06/#SECURITY-381'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/05/06/3'...
{'cwe_ids': ['CWE-300'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T22:55:37Z', 'nvd_published_at': '2020-05-06T13:15:00Z'}
1.4.0
GHSA-jrcp-c39h-r29x
2022-07-06T20:12:06Z
2022-05-14T03:13:01Z
null
['CVE-2015-5346']
Improper Neutralization of Input During Web Page Generation in Apache Tomcat
Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field f...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M2'}]}], 'versions': ['9.0.0.M1']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5346'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1087'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1088'}, {'type': 'WEB', 'url': 'https://bto.bluecoat.com/security-advisory/sa118'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:12:06Z', 'nvd_published_at': '2016-02-25T01:59:00Z'}
1.4.0
GHSA-m36j-f2hf-qgj2
2022-12-06T21:39:52Z
2022-05-24T16:59:38Z
null
['CVE-2019-10472']
Jenkins Libvirt Slaves Plugin vlnerable to Incorrect Default Permissions
A missing permission check in Jenkins Libvirt Slaves Plugin allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:libvirt-slave'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10472'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/libvirt-slave-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:39:52Z', 'nvd_published_at': '2019-10-23T13:15:00Z'}
1.4.0
GHSA-mjgf-xmrr-6gvx
2023-09-25T18:56:49Z
2022-05-24T16:52:22Z
null
['CVE-2019-7853']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to the tax notifications configuration in the Magento admin panel.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7853'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220127030535/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-24'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:21:49Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-69cj-g7mw-mh72
2022-12-12T16:23:48Z
2022-05-17T00:33:25Z
null
['CVE-2017-1000094']
Jenkins Docker Commons Plugin allows any user with Overall/Read permission to get list of valid credentials IDs
Docker Commons Plugin provides a list of applicable credential IDs to allow users configuring a job to select the one they'd like to use to authenticate with a Docker Registry. This functionality did not check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those coul...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:docker-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000094'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/docker-commons-plugin/commit/07ddeff5331687db364d681504117b4e8b2dde6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/docker-commons-plugin'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:23:48Z', 'nvd_published_at': '2017-10-05T01:29:00Z'}
1.4.0
GHSA-hv53-qjg6-5pm9
2022-12-20T17:39:30Z
2022-05-24T17:13:39Z
null
['CVE-2020-2173']
XSS vulnerability in Jenkins Gatling Plugin
Gatling Plugin 1.2.7 and earlier serves Gatling reports in a manner that bypasses the `Content-Security-Policy` protection introduced in Jenkins 1.641 and 1.625.3. This results in a cross-site scripting (XSS) vulnerability exploitable by users able to change report content. Gatling Plugin 1.3.0 no longer allows viewin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gatling'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2173'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/gatling-plugin/commit/8a9ae59c6b3328776d38af6596b35cef1ced05a7'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-04-07/#SECURITY-1633'}, {'type': 'WEB', 'url': 'http://...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:39:30Z', 'nvd_published_at': '2020-04-07T13:15:00Z'}
1.4.0
GHSA-q52r-g8jf-wv3x
2022-11-22T18:57:26Z
2022-05-13T01:47:04Z
null
['CVE-2017-7680']
Apache OpenMeetings allows flash content to be loaded from untrusted domains
Apache OpenMeetings 1.0.0 has an overly permissive `crossdomain.xml` file. This allows for flash content to be loaded from untrusted domains.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7680'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/whhibri7ervbjvda'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:26Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-cqgv-256r-m9r8
2022-06-23T17:58:18Z
2022-05-24T17:41:42Z
null
['CVE-2020-7021']
Insertion of Sensitive Information into Log File in Elasticsearch
Elasticsearch versions before 7.10.0 and 6.8.14 have an information disclosure issue when audit logging and the emit_request_body option is enabled. The Elasticsearch audit log could contain sensitive information such as password hashes or authentication tokens. This could allow an Elasticsearch administrator to view t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.8.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.8.13'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7021'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-11-0-and-6-8-14-security-update/263915'}, {'type': 'PACKAGE', 'url': 'https://github.com/elastic/elasticsearch'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advis...
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:58:18Z', 'nvd_published_at': '2021-02-10T19:15:00Z'}
1.4.0
GHSA-j544-7q9p-6xp8
2023-02-02T01:32:51Z
2022-05-24T16:51:33Z
null
['CVE-2019-14322']
Pallets Werkzeug vulnerable to Path Traversal
In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'werkzeug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14322'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/werkzeug/'}, {'type': 'WEB', 'url': 'https://palletsprojects.com/blog/werkzeug-0-15-5-released/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163398/Pallets-Werkzeug-...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T01:32:51Z', 'nvd_published_at': '2019-07-28T13:15:00Z'}
1.4.0
GHSA-hpv5-v8g5-c864
2023-08-08T11:20:28Z
2022-05-17T00:26:00Z
null
['CVE-2017-15612']
Cross-site Scripting in Mistune
mistune.py in Mistune 0.7.4 allows XSS via an unexpected newline (such as in java\nscript:) or a crafted email address, related to the escape and autolink functions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mistune'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15612'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/pull/140'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/commit/d6f0b6402299bf5a380e7b4e77bd80e8736630fe'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T19:44:32Z', 'nvd_published_at': '2017-10-19T08:29:00Z'}
1.4.0
GHSA-wc97-7623-rxwx
2022-05-18T18:58:58Z
2022-05-01T00:00:33Z
null
['CVE-2022-29265']
Multiple components in Apache NiFi do not restrict XML External Entity references
Apache NiFi is a system to process and distribute data. Multiple components in Apache NiFi 0.0.1 to 1.16.0 do not restrict XML External Entity references in the default configuration. The Standard Content Viewer service attempts to resolve XML External Entity references when viewing formatted XML files. The following P...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'fixed': '1.16.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29265'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/47od9kr9n4cyv0mv81jh3pkyx815kyjl'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2022-29265'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-18T18:58:58Z', 'nvd_published_at': '2022-04-30T08:15:00Z'}
1.4.0
GHSA-q3pw-6vf2-66hf
2023-07-31T21:12:28Z
2022-05-17T02:52:22Z
null
['CVE-2016-4976']
Apache Ambari reveals administrator passwords
Apache Ambari 2.x before 2.4.0 includes KDC administrator passwords on the kadmin command line, which allows local users to obtain sensitive information via a process listing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ambari:ambari'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4976'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/AMBARI/Ambari+Vulnerabilities#AmbariVulnerabilities-FixedinAmbari2.4.0'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124014838/http://www.securityfocus.com/bi...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:12:28Z', 'nvd_published_at': '2017-03-29T20:59:00Z'}
1.4.0
GHSA-xqw9-ffx7-g998
2023-07-31T19:55:43Z
2022-05-17T02:37:29Z
null
['CVE-2016-5702']
phpMyAdmin cookie-attribute injection
phpMyAdmin 4.6.x before 4.6.3, when the environment lacks a PHP_SELF value, allows remote attackers to conduct cookie-attribute injection attacks via a crafted URI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5702'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/27caf5b46bd0890e576fea7bd7b166a0639fdf68'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/sec...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:55:43Z', 'nvd_published_at': '2016-07-03T01:59:00Z'}
1.4.0
GHSA-4x32-h296-rg6j
2023-07-22T00:00:49Z
2022-05-14T01:01:38Z
null
['CVE-2018-12021']
Singularity Incorrect Access Control
Singularity 2.3.0 through 2.5.1 is affected by an incorrect access control on systems supporting overlay file system. When using the overlay option, a malicious user may access sensitive information by exploiting a few specific Singularity features.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hpcng/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'last_affected': '2.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12021'}, {'type': 'WEB', 'url': 'https://github.com/singularityware/singularity/releases/tag/2.5.2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/05/16/1'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-22T00:00:49Z', 'nvd_published_at': '2018-07-05T18:29:00Z'}
1.4.0
GHSA-gxcf-6h72-8gxf
2023-07-21T22:07:11Z
2022-05-13T01:20:49Z
null
['CVE-2018-8367']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8465, CVE-2018-8466, CVE-2018-8467.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8367'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5688'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/dd5b2e75e7aebe67b5185383080c0648f5353ea0'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:07:11Z', 'nvd_published_at': '2018-09-13T00:29:00Z'}
1.4.0
GHSA-vx5c-598g-qpg6
2023-07-28T20:20:13Z
2022-05-14T02:22:41Z
null
['CVE-2016-7208']
ChakraCore RCE Vulnerability
The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7208'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1982'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c2787ef8fdb7401922e9ec6540e4e5895d11c631'}, {'type': 'WEB', 'url': 'https://docs.microso...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:20:13Z', 'nvd_published_at': '2016-11-10T06:59:00Z'}
1.4.0
GHSA-67rh-9p29-vrxr
2023-02-08T18:12:12Z
2022-05-14T01:58:45Z
null
['CVE-2015-7713']
OpenStack Compute (Nova) allows remote attackers to bypass intended restriction
OpenStack Compute (Nova) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) do not properly apply security group changes, which allows remote attackers to bypass intended restriction by leveraging an instance that was running when the change was made.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2014.2.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2015.1.0'}, {'fixed': '2015.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7713'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:2673'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:2684'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0013'}, {'type': 'WEB',...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:12:12Z', 'nvd_published_at': '2015-10-29T20:59:00Z'}
1.4.0
GHSA-vmvp-2hhx-rgm8
2022-11-01T22:47:53Z
2022-05-24T17:03:46Z
null
['CVE-2019-16551']
Cross-Site Request Forgery in Jenkins Gerrit Trigger Plugin
A cross-site request forgery vulnerability in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.30.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16551'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1527'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:47:53Z', 'nvd_published_at': '2019-12-17T15:15:00Z'}
1.4.0
GHSA-799h-qr84-pcrp
2023-07-31T18:23:01Z
2022-05-13T01:26:14Z
null
['CVE-2016-3691']
Kallithea Routes CSRF Bypass
Routes in Kallithea before 0.3.2 allows remote attackers to bypass the CSRF protection by using the GET HTTP request method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'kallithea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3691'}, {'type': 'PACKAGE', 'url': 'https://github.com/NexMirror/Kallithea'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/05/02/3'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:23:01Z', 'nvd_published_at': '2017-04-24T18:59:00Z'}
1.4.0
GHSA-x25x-j4w4-7m59
2022-06-28T22:41:36Z
2022-05-24T16:51:50Z
null
['CVE-2019-10356']
Return of Pointer Value Outside of Expected Rang in Jenkins Script Security Plugin
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of method pointer expressions allowed attackers to execute arbitrary code in sandboxed scripts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.62'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.61'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10356'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2594'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2651'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2662'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-466'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:41:36Z', 'nvd_published_at': '2019-07-31T13:15:00Z'}
1.4.0
GHSA-vpqm-88c4-x4cv
2022-06-28T23:22:24Z
2022-05-13T01:34:04Z
null
['CVE-2018-17244']
Exposure of Sensitive Information to an Unauthorized Actor in Elasticsearch
Elasticsearch Security versions 6.4.0 to 6.4.2 contain an error in the way request headers are applied to requests when using the Active Directory, LDAP, Native, or File realms. A request may receive headers intended for another request if the same username is being authenticated concurrently; when used with run as, th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17244'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-6-4-3-and-5-6-13-security-update/155594'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:22:24Z', 'nvd_published_at': '2018-12-20T22:29:00Z'}
1.4.0
GHSA-fcf9-6fv2-fc5v
2023-02-08T00:36:45Z
2022-05-13T01:19:23Z
null
['CVE-2018-17143']
golang.org/x/net/html has Improper Restriction of Operations within the Bounds of a Memory Buffer
The html package (aka x/net/html) through 2018-09-17 in Go mishandles <template><tBody><isindex/action=0>, leading to a "panic: runtime error" in inBodyIM in parse.go during an html.Parse call.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20180921000356-2f5d2388922f'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17143'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/27704'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/go'}, {'type': 'WEB', 'url': 'https://go-review.googlesource.com/c/net/+/136575'}, {'type': 'WEB', 'url': 'https://g...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:36:45Z', 'nvd_published_at': '2018-09-17T14:29:00Z'}
1.4.0
GHSA-c9gx-27hq-wcvj
2023-08-17T23:34:09Z
2022-05-17T03:46:32Z
null
['CVE-2013-1880']
Apache ActiveMQ Cross-site scripting (XSS) vulnerability in the Portfolio publisher servlet
Cross-site scripting (XSS) vulnerability in the Portfolio publisher servlet in the demo web application in Apache ActiveMQ before 5.9.0 allows remote attackers to inject arbitrary web script or HTML via the refresh parameter to demo/portfolioPublish, a different vulnerability than CVE-2012-6092.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1880'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=924447'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AMQ-4398'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1029.html'}, {'type': 'WE...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T23:34:09Z', 'nvd_published_at': '2014-02-05T18:55:00Z'}
1.4.0
GHSA-c33v-23rx-7qqc
2023-09-25T19:05:49Z
2022-05-24T16:52:23Z
null
['CVE-2019-7864']
Magento 2 Community Edition IDOR Vulnerability
An insecure direct object reference (IDOR) vulnerability exists in the RSS feeds of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can lead to unauthorized access to order details.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7864'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121011306/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-33'}]
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:54:19Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-4926-qpxg-6r3w
2022-06-22T18:29:53Z
2022-05-24T19:19:03Z
null
['CVE-2021-22047']
Exposure of Resource to Wrong Sphere in Spring Data REST
In Spring Data REST versions 3.4.0 - 3.4.13, 3.5.0 - 3.5.5, and older unsupported versions, HTTP resources implemented by custom controllers using a configured base API path and a controller type-level request mapping are additionally exposed under URIs that can potentially be exposed for unauthorized access depending ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-rest-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.13'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springfram...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22047'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22047'}]
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:29:53Z', 'nvd_published_at': '2021-10-28T16:15:00Z'}
1.4.0
GHSA-vjf8-xw6c-wjhq
2022-12-20T22:14:19Z
2022-05-24T17:25:25Z
null
['CVE-2020-2237']
CSRF vulnerability in Jenkins Flaky Test Handler Plugin
Flaky Test Handler Plugin 1.0.4 and earlier does not require POST requests for the "Deflake this build" feature, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to rebuild a project at a previous git revision where the tests were failing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:flaky-test-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2237'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/flaky-test-handler-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1763'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:14:19Z', 'nvd_published_at': '2020-08-12T14:15:00Z'}
1.4.0
GHSA-99v3-9x35-c5vf
2022-07-07T22:34:04Z
2022-05-13T01:09:20Z
null
['CVE-2014-3623']
Improper Authentication in Apache WSS4J
Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does not properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vectors.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ws.security:wss4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.wss4j:wss4j-ws-security-dom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3623'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/97754'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/WSS-511'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327d...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:34:04Z', 'nvd_published_at': '2014-10-30T14:55:00Z'}
1.4.0
GHSA-5jc8-8xhv-g8qm
2022-07-12T22:17:46Z
2022-05-17T01:38:40Z
null
['CVE-2012-5817']
Improper Input Validation in XFire
Codehaus XFire 1.2.6 and earlier, as used in the Amazon EC2 API Tools Java library and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an a...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.xfire:xfire-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5817'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/79934'}, {'type': 'WEB', 'url': 'http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:17:46Z', 'nvd_published_at': '2012-11-04T22:55:00Z'}
1.4.0
GHSA-h88f-r7cw-8fv3
2022-06-21T20:11:22Z
2022-05-24T19:14:00Z
null
['CVE-2021-38540']
Missing Authentication for Critical Function in Apache Airflow
The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. This issue affects Apache Airf...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38540'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/bcec1df703cd4a01520a90c3f801cca6f97d9bfd'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h88f-r7cw-8fv3'}, {'type': 'PACKAGE', 'url': 'https://github.com/a...
{'cwe_ids': ['CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:11:22Z', 'nvd_published_at': '2021-09-09T15:15:00Z'}
1.4.0
GHSA-ggww-q2gv-m3g4
2023-07-25T18:25:52Z
2022-05-14T01:41:09Z
null
['CVE-2018-19799']
Dolibarr ERP and CRM contain XSS Vulnerability
Dolibarr ERP/CRM through 8.0.3 has `/exports/export.php?datatoexport=` XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19799'}, {'type': 'WEB', 'url': 'https://pentest.com.tr/exploits/Dolibarr-ERP-CRM-8-0-3-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45945/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:25:52Z', 'nvd_published_at': '2018-12-26T21:29:00Z'}
1.4.0
GHSA-pwjq-6wrh-5w8q
2023-07-24T22:17:36Z
2022-05-14T01:36:38Z
null
['CVE-2018-19960']
OnionShare Predictable Pathname
The `debug_mode` function in `web/web.py` in OnionShare through 1.3.1, when `--debug` is enabled, uses the `/tmp/onionshare_server.log` pathname for logging, which might allow local users to overwrite files or obtain sensitive information by using this pathname.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19960'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/915859'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T22:17:36Z', 'nvd_published_at': '2018-12-07T16:29:00Z'}
1.4.0
GHSA-32w9-2qpc-5f9v
2022-11-01T23:33:48Z
2022-05-13T01:04:24Z
null
['CVE-2019-0204']
Docker image code execution with Apache Mesos
A specifically crafted Docker image running under the root user can overwrite the init helper binary of the container runtime and/or the command executor in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.2, 1.6.0 to 1.6.1, and 1.7.0 to 1.7.1. A malicious actor can therefore gain root-level code execution...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.3'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0204'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c@%3Cdev.mesos.apache.org%3E'}, {'type': 'WEB', '...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:33:48Z', 'nvd_published_at': '2019-03-25T22:29:00Z'}
1.4.0
GHSA-q7v2-w38r-pv7v
2023-08-29T22:35:39Z
2022-05-17T05:25:11Z
null
['CVE-2012-4579']
phpMyAdmin Multiple XSS Vulnerabilities
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.2.2 allow remote authenticated users to inject arbitrary web script or HTML via a Table Operations (1) TRUNCATE or (2) DROP link for a crafted table name, (3) the Add Trigger popup within a Triggers page that references crafted table nam...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4579'}, {'type': 'WEB', 'url': 'http://www.phpmyadmin.net/home_page/security/PMASA-2012-4.php'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T22:35:39Z', 'nvd_published_at': '2012-08-21T23:55:00Z'}
1.4.0
GHSA-hjfh-7c4v-7q8h
2022-06-17T17:20:31Z
2022-05-02T03:39:47Z
null
['CVE-2009-2901']
Improper Authentication in Apache Tomcat
The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.29'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.5.28'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-2901'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/55856'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'typ...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T17:20:31Z', 'nvd_published_at': '2010-01-28T20:30:00Z'}
1.4.0
GHSA-r9jw-mwhq-wp62
2022-09-12T14:50:37Z
2022-05-13T01:42:19Z
null
['CVE-2017-11424']
PyJWT vulnerable to key confusion attacks
In PyJWT 1.5.0 and below the `invalid_strings` check in `HMACAlgorithm.prepare_key` does not account for all PEM encoded public keys. Specifically, the PKCS1 PEM encoded format would be allowed because it is prefaced with the string `-----BEGIN RSA PUBLIC KEY-----` which is not accounted for. This enables symmetric/asy...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyjwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11424'}, {'type': 'WEB', 'url': 'https://github.com/jpadilla/pyjwt/pull/277'}, {'type': 'PACKAGE', 'url': 'https://github.com/jpadilla/pyjwt'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3979'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T14:50:37Z', 'nvd_published_at': '2017-08-24T16:29:00Z'}
1.4.0
GHSA-c57p-3v2g-w9rg
2022-07-13T17:26:44Z
2022-05-14T01:17:03Z
null
['CVE-2011-2204']
Insertion of Sensitive Information into Log File in Apache Tomcat
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file. This issue was fixed in Apache Tomcat...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2204'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=717013'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/68238'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WE...
{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:26:44Z', 'nvd_published_at': '2011-06-29T17:55:00Z'}
1.4.0
GHSA-fx7f-rjqj-52pj
2022-06-22T18:24:49Z
2022-05-24T19:19:03Z
null
['CVE-2021-22097']
Deserialization of Untrusted Data in Spring AMQP
In Spring AMQP versions 2.2.0 - 2.2.18 and 2.3.0 - 2.3.10, the Spring AMQP Message object, in its toString() method, will deserialize a body for a message with content type application/x-java-serialized-object. It is possible to construct a malicious java.util.Dictionary object that can cause 100% CPU usage in the appl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp:spring-amqp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.18'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22097'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22097'}]
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:24:49Z', 'nvd_published_at': '2021-10-28T16:15:00Z'}
1.4.0
GHSA-wwr4-79jv-297r
2022-12-06T21:48:30Z
2022-05-24T16:58:49Z
null
['CVE-2019-10445']
Missing permission checks in Google Kubernetes Engine Jenkins Plugin
A missing permission check in Jenkins Google Kubernetes Engine Plugin Prior to version 0.7.1 allows attackers with Overall/Read permission to obtain limited information about the scope of a credential with an attacker-specified credentials ID. This issue is patched in version 0.7.1
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-kubernetes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10445'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-kubernetes-engine-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1607'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:48:30Z', 'nvd_published_at': '2019-10-16T14:15:00Z'}
1.4.0
GHSA-793v-r35j-9rp9
2023-07-27T23:20:45Z
2022-05-24T16:48:34Z
null
['CVE-2016-7404']
Openstack Magnum Unsafe Credential Handling
OpenStack Magnum passes OpenStack credentials into the Heat templates creating its instances. While these should just be used for retrieving the instances' SSL certificates, they allow full API access, though and can be used to perform any API operation the user is authorized to perform.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'openstack-magnum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7404'}, {'type': 'WEB', 'url': 'https://github.com/openstack/magnum/commit/e93d82e8b3bc19211efd54edc17aebdca50670c1'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/magnum/+bug/1620536'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_...
{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T23:20:45Z', 'nvd_published_at': '2019-06-21T14:15:00Z'}
1.4.0
GHSA-g4rg-993r-mgx7
2023-09-11T22:27:13Z
2022-05-24T19:18:27Z
null
['CVE-2021-42740']
Improper Neutralization of Special Elements used in a Command in Shell-quote
The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with `exec()`, an attacker can inject arbi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'shell-quote'}, 'ecosystem_specific': {'affected_functions': ['shell-quote.quote']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42740'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/shell-quote/commit/5799416ed454aa4ec9afafc895b4e31760ea1abe'}, {'type': 'PACKAGE', 'url': 'https://github.com/ljharb/shell-quote'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/shell-q...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:08:10Z', 'nvd_published_at': '2021-10-21T15:15:00Z'}
1.4.0
GHSA-rf7h-9m85-535v
2022-12-12T16:29:27Z
2022-05-14T02:21:29Z
null
['CVE-2018-1999038']
Jenkins Publisher Over CIFS Plugin confused deputy vulnerability
A confused deputy vulnerability exists in Jenkins Publisher Over CIFS Plugin 0.10 and earlier in CifsPublisherPluginDescriptor.java that allows attackers to have Jenkins connect to an attacker specified CIFS server with attacker specified credentials. Additionally, this form validation method did not require POST reque...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-cifs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999038'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-cifs-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-30/#SECURITY-975'}]
{'cwe_ids': ['CWE-441'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:29:27Z', 'nvd_published_at': '2018-08-01T13:29:00Z'}
1.4.0
GHSA-4c42-4rxm-x6qf
2023-08-17T23:30:35Z
2022-05-17T04:53:45Z
null
['CVE-2013-1443']
Django Denial of Service Vulnerability in the authentication framework
The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'typ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1443'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/22b74fa09d7ccbc8c52270d648a0da7f3f0fa2bc'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/3f3d887a6844ec2db743fee64c9e53e04d39a368'}, {'type': 'PACKAGE', 'url...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T23:30:35Z', 'nvd_published_at': '2013-09-23T20:55:00Z'}
1.4.0
GHSA-84cw-mxhv-qvv4
2023-08-02T22:33:28Z
2022-05-17T03:43:03Z
null
['CVE-2016-1505']
Radicale is vulnerable to directory traversal on Windows Filesystem Storage Backend component
The filesystem storage backend in Radicale before 1.1 on Windows allows remote attackers to read or write to arbitrary files via a crafted path, as demonstrated by /c:/file/ignore.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Radicale'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1505'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/Radicale/pull/343'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/Radicale/commit/b4b3d51f33c7623d312f289252dd7bbb8f58bbe6'}, {'type': 'PACKAGE', 'url': 'https://github.com/Kozea/Radicale...
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T22:33:28Z', 'nvd_published_at': '2016-02-03T18:59:00Z'}
1.4.0
GHSA-x24q-xwrf-66jm
2022-07-08T19:18:52Z
2022-05-17T01:58:13Z
null
['CVE-2013-4204']
Improper Neutralization of Input During Web Page Generation in Google Web Toolkit
Multiple cross-site scripting (XSS) vulnerabilities in the JUnit files in the GWTTestCase in Google Web Toolkit (GWT) before 2.5.1 RC1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.google.gwt:gwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4204'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-4204'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=992911'}, {'type': 'WEB', 'url': 'http://www.gwtproject.org/release-notes.html#Release_Notes...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:18:52Z', 'nvd_published_at': '2013-11-18T02:55:00Z'}
1.4.0
GHSA-fcgg-rvwg-jv58
2022-11-21T19:45:47Z
2022-05-26T00:01:27Z
null
['CVE-2022-30321']
HashiCorp go-getter unsafe downloads
HashiCorp go-getter through 2.0.2 does not safely perform downloads. Protocol switching, endless redirect, and configuration bypass were possible via abuse of custom HTTP response header processing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30321'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/pull/359'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/pull/361'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/38e97387488f5439616...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:20:37Z', 'nvd_published_at': '2022-05-25T12:15:00Z'}
1.4.0
GHSA-8r7q-cvjq-x353
2022-07-07T22:50:31Z
2022-05-14T04:04:14Z
null
['CVE-2014-1402']
Incorrect Privilege Assignment in Jinja2
The default configuration for bccache.FileSystemBytecodeCache in Jinja2 before 2.7.2 does not properly create temporary files, which allows local users to gain privileges via a crafted .cache file with a name starting with __jinja2_ in /tmp.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Jinja2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1402'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1051421'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8r7q-cvjq-x35...
{'cwe_ids': ['CWE-266'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:50:31Z', 'nvd_published_at': '2014-05-19T14:55:00Z'}
1.4.0
GHSA-8qxp-g8jv-p37x
2022-11-02T00:42:59Z
2022-05-13T01:05:22Z
null
['CVE-2019-1003004']
Improper Authorization in Jenkins Core
An improper authorization vulnerability exists in Jenkins 2.158 and earlier, LTS 2.150.1 and earlier in core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java that allows attackers to extend the duration of active HTTP sessions indefinitely even though the user account may have been deleted in the mean...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.159'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003004'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0327'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-01-16/#SECURITY-901'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106680'}]
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:42:59Z', 'nvd_published_at': '2019-01-22T14:29:00Z'}
1.4.0
GHSA-p9vf-4jx2-5hpp
2023-09-26T18:50:25Z
2022-05-24T17:00:24Z
null
['CVE-2019-8112']
Magento 2 Community Edition Security Bypass
A security bypass vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An unauthenticated user can bypass the email confirmation mechanism via GET request that captures relevant account data obtained from the POST response related to new user creation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8112'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:02:18Z', 'nvd_published_at': '2019-11-05T23:15:00Z'}
1.4.0
GHSA-36c3-jcm2-rm3j
2023-07-28T20:32:58Z
2022-05-14T02:22:45Z
null
['CVE-2016-7194']
ChakraCore RCE Vulnerability
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3386, CVE-2016-3389, and CVE-2016-7190.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7194'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-119'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210623180451/http://www.securityfocus.com/bid/93399'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:32:58Z', 'nvd_published_at': '2016-10-14T02:59:00Z'}
1.4.0
GHSA-4cmq-88f8-53r5
2022-12-06T21:25:47Z
2022-05-24T16:58:49Z
null
['CVE-2019-10439']
Jenkins CRX Content Package Deployer Plugin subject to credentials enumeration via Missing Authorization
A missing permission check in Jenkins CRX Content Package Deployer Plugin prior to version 1.9 in various 'doFillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. This issue is patched in version 1.9.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:crx-content-package-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10439'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/crx-content-package-deployer-plugin/commit/06cd0e7e1b3f2fb87b3fa332ee1da710ca94b8e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/crx-content-package-deployer-plugin/'}, {'...
{'cwe_ids': ['CWE-285', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:25:47Z', 'nvd_published_at': '2019-10-16T14:15:00Z'}
1.4.0
GHSA-qh9x-mc42-vg4g
2022-07-27T21:33:52Z
2022-05-14T03:32:28Z
null
['CVE-2018-1000089']
django-anymail Includes Sensitive Information in Log Files
Anymail django-anymail version version 0.2 through 1.3 contains a CWE-532, CWE-209 vulnerability in WEBHOOK_AUTHORIZATION setting value that can result in An attacker with access to error logs could fabricate email tracking events. This attack appear to be exploitable via If you have exposed your Django error reports, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-anymail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2'}, {'fixed': '1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000089'}, {'type': 'WEB', 'url': 'https://github.com/anymail/django-anymail/commit/1a6086f2b58478d71f89bf27eb034ed81aefe5ef'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qh9x-mc42-vg4g'}, {'type': 'PACKAGE', 'url': 'https://gi...
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T21:33:52Z', 'nvd_published_at': '2018-03-13T15:29:00Z'}
1.4.0
GHSA-qgrq-64g6-mmh6
2023-07-31T21:46:10Z
2022-05-17T02:36:36Z
null
['CVE-2016-9863']
phpMyAdmin DoS Vulnerability
An issue was discovered in phpMyAdmin. With a very large request to table partitioning function, it is possible to invoke a Denial of Service (DoS) attack. All 4.6.x versions (prior to 4.6.5) are affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9863'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123194704/http://www.securityfocus.com/bid/94526'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/P...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:46:10Z', 'nvd_published_at': '2016-12-11T03:00:00Z'}
1.4.0
GHSA-94hc-7qc9-34rf
2023-07-26T22:35:58Z
2022-05-14T03:41:55Z
null
['CVE-2017-1000507']
Canvs Canvas XSS Vulnerability
Canvs Canvas version 3.4.2 contains a Cross Site Scripting (XSS) vulnerability in User's details that can result in denial of service and execution of javascript code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'austintoddj/canvas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000507'}, {'type': 'WEB', 'url': 'https://github.com/cnvs/canvas/issues/359'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T22:35:58Z', 'nvd_published_at': '2018-02-09T23:29:00Z'}
1.4.0
GHSA-hv45-5j9h-7fhg
2022-06-30T17:22:32Z
2022-05-14T01:04:36Z
null
['CVE-2018-1000407']
Cross-site Scripting in Jenkins
A cross-site scripting vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/Api.java that allows attackers to specify URLs to Jenkins that result in rendering arbitrary attacker-controlled HTML by Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.138.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.138.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000407'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/df87e12ddcfeafdba6e0de0e07b3e21f8473ece6'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-10-10/#SECURITY-1129'}, {'type': 'WEB', 'url': 'http://www....
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T17:22:32Z', 'nvd_published_at': '2019-01-09T23:29:00Z'}
1.4.0
GHSA-384c-gg34-g96h
2022-07-06T19:51:48Z
2022-05-01T17:42:17Z
null
['CVE-2007-0184']
Incorrect Authorization in Getahead Direct Web Remoting
Getahead Direct Web Remoting (DWR) before 1.1.4 allows attackers to obtain unauthorized access to public methods via a crafted request that bypasses the include/exclude checks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.directwebremoting:dwr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-0184'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/31377'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:51:48Z', 'nvd_published_at': '2007-01-12T05:04:00Z'}
1.4.0
GHSA-8rfc-v3vj-j62w
2022-11-22T19:09:14Z
2022-05-24T17:03:49Z
null
['CVE-2019-16574']
Jenkins Alauda DevOps Pipeline Plugin allows attackers with Overall/Read permission to capture credentials stored in Jenkins
A missing permission check in Jenkins Alauda DevOps Pipeline Plugin 2.3.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.alauda.jenkins.plugins:alauda-devops-pipeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16574'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1600'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}]
{'cwe_ids': ['CWE-285', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:09:14Z', 'nvd_published_at': '2019-12-17T15:15:00Z'}
1.4.0
GHSA-2m5h-6g38-jjf2
2023-09-28T20:18:37Z
2022-05-13T01:21:17Z
null
['CVE-2019-0568']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2019-0539, CVE-2019-0567.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0568'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d73c5f12d9c5cbbf64f59ae04e76a531b3e844b3'}, {'type': 'PACKAGE', 'url': 'https://github.com/chakra-core/ChakraCore'}, {'type': 'WEB', 'url': 'https://portal.msrc.micros...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T20:21:04Z', 'nvd_published_at': '2019-01-08T21:29:00Z'}
1.4.0
GHSA-g2vx-8v47-4vhh
2023-01-14T05:29:31Z
2022-05-17T05:44:11Z
null
['CVE-2010-4335']
CakePHP allows remote attackers to modify internal Cake cache and execute arbitrary code
The `_validatePost` function in `libs/controller/components/security.php` in CakePHP 1.3.x through 1.3.5 and 1.2.8 allows remote attackers to modify the internal Cake cache and execute arbitrary code via a crafted `data[_Token][fields]` value that is processed by the unserialize function, as demonstrated by modifying t...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.8'}, {'fixed': '1.3.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-4335'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/e431e86aa4301ced4273dc7919b59362cbb353cb'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}, {'type': 'WEB', 'url': 'http://malloc.im/CakePHP-unserialize.txt...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:29:31Z', 'nvd_published_at': '2011-01-14T23:00:00Z'}
1.4.0
GHSA-hf26-vvmx-x8c8
2023-09-22T21:57:47Z
2022-05-01T18:36:14Z
null
['CVE-2007-5741']
Plone Arbitrary Code Execution via Unsafe Handling of Pickles
Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrary Python code via network data containing pickled objects for the (1) statusmessages or (2) linkintegrity module, which the module unpickles and executes.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5'}, {'fixed': '2.5.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.4'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5741'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/38288'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080507055819/https://plone.org/about/security/advisories/cve-2007-5741'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:57:47Z', 'nvd_published_at': '2007-11-07T21:46:00Z'}
1.4.0
GHSA-r4rv-cq77-6p24
2023-02-02T23:26:11Z
2022-05-24T16:51:50Z
null
['CVE-2019-10359']
Jenkins Maven Release Plugin contains Cross-Site Request Forgery vulnerability
A cross-site request forgery vulnerability in Jenkins Maven Release Plugin prior to 0.15.0 in the M2ReleaseAction#doSubmit method allowed attackers to perform releases with attacker-specified options.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.m2release:m2release'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10359'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/m2release-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T23:26:11Z', 'nvd_published_at': '2019-07-31T13:15:00Z'}
1.4.0
GHSA-jmg4-x4vp-6c6x
2022-11-08T14:16:18Z
2022-05-13T01:18:20Z
null
['CVE-2017-15695']
Apache Geode vulnerable to Incorrect Authorization
When an Apache Geode server versions 1.0.0 to 1.4.0 is configured with a security manager, a user with DATA:WRITE privileges is allowed to deploy code by invoking an internal Geode function. This allows remote code execution. Code deployment should be restricted to users with DATA:MANAGE privilege.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15695'}, {'type': 'WEB', 'url': 'https://github.com/apache/geode/pull/1258'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/GEODE/Release+Notes#ReleaseNotes-SecurityVulnerabilities'}, {'type': 'WEB', 'url': 'https://issues.apa...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:16:18Z', 'nvd_published_at': '2018-06-13T17:29:00Z'}
1.4.0
GHSA-cjcf-wm2p-59h5
2022-07-01T17:10:39Z
2022-05-13T01:45:42Z
null
['CVE-2017-3589']
Exposure of Sensitive Information to an Unauthorized Actor in Oracle MySQL Connectors Java
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Suc...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'mysql:mysql-connector-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.42'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.41'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3589'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3857'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:10:39Z', 'nvd_published_at': '2017-04-24T19:59:00Z'}
1.4.0
GHSA-9m82-f3wx-p625
2023-07-25T17:54:38Z
2022-05-14T01:53:39Z
null
['CVE-2018-18478']
LibreNMS XSS Vulnerability
Persistent Cross-Site Scripting (XSS) issues in LibreNMS before 1.44 allow remote attackers to inject arbitrary web script or HTML via the dashboard_name parameter in the /ajax_form.php resource, related to html/includes/forms/add-dashboard.inc.php, html/includes/forms/delete-dashboard.inc.php, and html/includes/forms/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.44'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18478'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/issues/9170'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/9171'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/releases/tag/1.44'}, {'type'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T17:54:38Z', 'nvd_published_at': '2018-10-18T17:29:00Z'}
1.4.0
GHSA-qx32-f6g6-fcfr
2023-08-29T17:53:16Z
2022-05-22T00:00:32Z
null
['CVE-2022-31259']
Access control bypass in beego
The route lookup process in beego prior to 1.12.9 and 2.x prior to 2.0.3 allows attackers to bypass access control. When a /`p1`/`p2`/`:name` route is configured, attackers can access it by appending .xml in various places (e.g., p1.xml instead of p1).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego'}, 'ecosystem_specific': {'affected_function...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31259'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/issues/4946'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/4954'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/4958'}, {'type': 'WEB', 'url': 'https://g...
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:35:48Z', 'nvd_published_at': '2022-05-21T19:15:00Z'}
1.4.0
GHSA-hfpg-gqjw-779m
2022-06-30T18:25:33Z
2022-05-14T01:27:45Z
null
['CVE-2018-1000129']
Cross-site Scripting in Jolokia agent
An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jolokia:jolokia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.7'}, {'fixed': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000129'}, {'type': 'WEB', 'url': 'https://github.com/rhuss/jolokia/commit/5895d5c137c335e6b473e9dcb9baf748851bbc5f#diff-f19898247eddb55de6400489bff748ad'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T18:25:33Z', 'nvd_published_at': '2018-03-14T13:29:00Z'}
1.4.0
GHSA-28rm-rj57-qjpv
2023-09-25T14:11:44Z
2022-05-17T04:42:46Z
null
['CVE-2014-2054']
PHPExcel vulnerable to XXE attacks through libxml
PHPExcel before 1.8.0, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, does not disable external entity loading in libxml, which allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpoffice/phpexcel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2054'}, {'type': 'WEB', 'url': 'https://github.com/PHPOffice/PHPExcel/commit/e04bf7ed091b0a72d028eacf26d770b485d4e897'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPOffice/PHPExcel'}, {'type': 'WEB', 'url': 'https://github.com/PHPOffice/PHPEx...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-25T14:11:44Z', 'nvd_published_at': '2014-06-04T14:55:00Z'}
1.4.0
GHSA-h6c8-x5r3-pm88
2023-08-17T22:16:37Z
2022-05-13T01:12:13Z
null
['CVE-2013-4444']
Apache Tomcat Unrestricted file upload vulnerability
Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0'}, {'fixed': '7.0.40'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4444'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archiv...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:16:37Z', 'nvd_published_at': '2014-09-12T01:55:00Z'}
1.4.0
GHSA-xf37-qcvf-7m57
2023-09-04T16:56:18Z
2022-05-24T19:13:30Z
null
['CVE-2021-22004']
Improper Authentication in SaltStack Salt
An issue was discovered in SaltStack Salt before 3003.3. The salt minion installer will accept and use a minion config file at C:\salt\conf if that file is in place before the installer is run. This allows for a malicious actor to subvert the proper behaviour of the given minion software.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3003.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22004'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xf37-qcvf-7m57'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2021-346.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:42:48Z', 'nvd_published_at': '2021-09-08T15:15:00Z'}
1.4.0
GHSA-vc3x-72q4-g3p5
2022-11-04T18:42:12Z
2022-05-13T01:36:17Z
null
['CVE-2017-7545']
XML External Entity Reference in jbpmmigration
It was discovered that the XmlUtils class in jbpmmigration performed expansion of external parameter entities while parsing XML files. A remote attacker could use this flaw to read files accessible to the user running the application server and, potentially, perform other more advanced XML eXternal Entity (XXE) attacks...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jbpm.jbpm5:jbpmmigration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7545'}, {'type': 'WEB', 'url': 'https://github.com/kiegroup/jbpm-designer/commit/a143f3b92a6a5a527d929d68c02a0c5d914ab81d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3354'}, {'type': 'WEB', 'url': 'https://access.redhat.co...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:42:12Z', 'nvd_published_at': '2018-07-26T15:29:00Z'}
1.4.0
GHSA-3f57-w2rp-72fc
2022-11-08T12:43:33Z
2022-05-17T00:15:06Z
null
['CVE-2016-7046']
Undertow Uncaught Exception vulnerability
A long URL proxy request lead to java.nio.BufferOverflowException in Undertow.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7046'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/c518b5a1784061d807efedcef0a03fcd35a53de2'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1376646'}, {'type': 'PACKAGE', 'url': 'https://github.com...
{'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T12:43:33Z', 'nvd_published_at': '2016-10-03T21:59:00Z'}
1.4.0
GHSA-3wcj-rg8q-9cqv
2022-07-08T19:21:47Z
2022-05-14T03:47:22Z
null
['CVE-2017-11879']
Open redirect in ASP.NET Core
ASP.NET Core 2.0 allows an attacker to steal log-in session information such as cookies or authentication tokens via a specially crafted URL aka "ASP.NET Core Elevation Of Privilege Vulnerability".
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11879'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/277'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidan...
{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:21:47Z', 'nvd_published_at': '2017-11-15T03:29:00Z'}
1.4.0
GHSA-4xf6-xr96-7vmp
2023-08-16T23:18:11Z
2022-05-17T04:42:00Z
null
['CVE-2014-3995']
Djblets Cross-site scripting Vulnerability
A cross-site scripting (XSS) vulnerability in `gravatars/templatetags/gravatars.py` in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django allows remote attackers to inject arbitrary web script or HTML via a user display name.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'djblets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.30'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'djblets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3995'}, {'type': 'WEB', 'url': 'https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd'}, {'type': 'WEB', 'url': 'https://github.com/djblets/djblets/commit/77ac64642ad530bf69e390c51fc6fdcb8914c8e7'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:18:11Z', 'nvd_published_at': '2014-06-16T18:55:00Z'}
1.4.0
GHSA-wrrh-g7h3-gqmx
2022-07-13T18:42:09Z
2022-05-17T01:49:58Z
null
['CVE-2012-0818']
Exposure of Sensitive Information to an Unauthorized Actor in RESTEasy
RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0818'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/resteasy/commit/71ace879cf92d323bfa4d3e88db0c3059109bbf6'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2012:0421'}, {'type': 'WEB', 'url': 'https://access.redhat.com/err...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:42:09Z', 'nvd_published_at': '2012-11-23T20:55:00Z'}
1.4.0
GHSA-73rx-3f9r-x949
2022-06-30T21:22:02Z
2022-05-14T01:10:15Z
null
['CVE-2017-7674']
Insufficient Verification of Data Authenticity in Apache Tomcat
The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M21'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7674'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/52382ebfbce20a98b01cd9d37184a12703987a5a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1801'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/...
{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T21:22:02Z', 'nvd_published_at': '2017-08-11T02:29:00Z'}
1.4.0
GHSA-279p-pc38-xx4p
2022-05-25T19:21:15Z
2022-05-25T19:21:15Z
null
['CVE-2019-17352']
JFinal file validation vulnerability
In JFinal cos before 2019-08-13, as used in JFinal 4.4, there is a vulnerability that can bypass the isSafeFile() function: one can upload any type of file. For example, a .jsp file may be stored and almost immediately deleted, but this deletion step does not occur for certain exceptions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.jfinal:jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17352'}, {'type': 'WEB', 'url': 'https://github.com/jfinal/jfinal/issues/171'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/jfinal/cos'}, {'type': 'WEB', 'url': 'https://gitee.com/jfinal/cos/commit/5eb23d6e384abaad19faa7600d14c9a2f525946a'}, {'ty...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:21:15Z', 'nvd_published_at': '2019-10-08T13:15:00Z'}
1.4.0
GHSA-5pg8-f89x-wjcx
2023-01-14T05:22:47Z
2022-05-24T17:10:28Z
null
['CVE-2020-2143']
Credentials transmitted in plain text by Jenkins Logstash Plugin
Logstash Plugin stores credentials in its global configuration file `jenkins.plugins.logstash.LogstashConfiguration.xml` on the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Logstash Plugin 2....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:logstash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2143'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/logstash-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1516'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03...
{'cwe_ids': ['CWE-319'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:22:47Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}
1.4.0
GHSA-cwq3-qp8v-w8q3
2023-09-18T23:46:51Z
2022-05-01T02:20:38Z
null
['CVE-2005-3747']
Mortbay Jetty Discloses JSP Source Code
Unspecified vulnerability in Jetty before 5.1.6 allows remote attackers to obtain source code of JSP pages, possibly involving requests for .jsp files with URL-encoded backslash (`%5C`) characters. NOTE: this might be the same issue as CVE-2006-2758.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2005-3747'}, {'type': 'WEB', 'url': 'http://sourceforge.net/project/shownotes.php?release_id=372086&group_id=7322'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/450315/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T23:46:51Z', 'nvd_published_at': '2005-11-22T11:03:00Z'}
1.4.0
GHSA-jpvq-v729-7j2h
2022-06-23T23:19:33Z
2022-05-24T17:25:24Z
null
['CVE-2020-2231']
Improper Neutralization of Input During Web Page Generation in Jenkins
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the remote address of the host starting a build via 'Trigger builds remotely', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission or knowledge of the Authentication Token.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.235.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.235.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2231'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1960'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160616/Jenkins-2.251-LTS-2.235.3-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T23:19:33Z', 'nvd_published_at': '2020-08-12T14:15:00Z'}
1.4.0
GHSA-fg3x-rwq9-74cw
2023-07-25T19:19:22Z
2022-05-14T02:20:32Z
null
['CVE-2018-15192']
Gogs and Gitea SSRF Vulnerability
An SSRF vulnerability in webhooks in Gitea through 1.5.0-rc2 and Gogs through 0.11.53 allows remote attackers to access intranet services.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.0-rc2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.53'}]}]}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15192'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/4624'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/5366'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:19:22Z', 'nvd_published_at': '2018-08-08T02:29:00Z'}
1.4.0
GHSA-66cr-6whx-732p
2023-02-03T23:24:51Z
2022-05-17T03:53:35Z
null
['CVE-2014-3665']
Jenkins improperly ensures trust separation
Jenkins prior to 1.587 and LTS before 1.580.1 do not properly ensure trust separation between a master and slaves, which might allow remote attackers to execute arbitrary code on the master by leveraging access to the slave.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.587'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3665'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2014:1630'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-3665'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1147767'}, {'type...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-03T23:24:51Z', 'nvd_published_at': '2015-11-25T20:59:00Z'}
1.4.0
GHSA-g4rw-82hq-8jpr
2023-07-26T20:22:18Z
2022-05-13T01:54:14Z
null
['CVE-2017-1000426']
MapProxy CSRF Vulnerability
MapProxy version 1.10.3 and older is vulnerable to a Cross Site Scripting attack in the demo service resulting in possible information disclosure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'MapProxy'}, 'ecosystem_specific': {'affected_functions': ['escape']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000426'}, {'type': 'WEB', 'url': 'https://github.com/mapproxy/mapproxy/issues/322'}, {'type': 'WEB', 'url': 'https://github.com/mapproxy/mapproxy/commit/420412aad45171e05752007a0a2350c03c28dfd8'}, {'type': 'WEB', 'url': 'https://github.com/mapprox...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T20:22:18Z', 'nvd_published_at': '2018-01-02T21:29:00Z'}
1.4.0
GHSA-735f-mx7h-46w8
2023-07-27T19:46:38Z
2022-05-17T00:11:59Z
null
['CVE-2017-11910']
ChakraCore RCE Vulnerability
ChakraCore and Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, C...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11910'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4411'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/40232a443c6316a58941572b0a4776b0677975ca'}, {'type': 'WEB', 'url': 'https://portal.msrc...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:46:38Z', 'nvd_published_at': '2017-12-12T21:29:00Z'}
1.4.0
GHSA-9848-v244-962p
2023-08-14T23:23:18Z
2022-05-14T02:21:24Z
null
['CVE-2012-1007']
Apache Struts XSS
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 1.3.10 allow remote attackers to inject arbitrary web script or HTML via (1) the name parameter to struts-examples/upload/upload-submit.do, or the message parameter to (2) `struts-cookbook/processSimple.do` or (3) `struts-cookbook/processDyna.do`.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1007'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/73052'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T21:09:51Z', 'nvd_published_at': '2012-02-07T04:09:00Z'}
1.4.0
GHSA-qpg9-83fv-x9ch
2022-06-29T13:30:25Z
2022-05-13T01:01:01Z
null
['CVE-2019-1003050']
Improper Neutralization of Input During Web Page Generation in Jenkins
The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.164.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.164.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003050'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/8eb632dda219ec8796420ce58d9564cddf8f8f93'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/d393c7e9ba3ec44953ef1f8b11839421e2649ee7'}, {'type': 'WEB...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T13:30:25Z', 'nvd_published_at': '2019-04-10T21:29:00Z'}
1.4.0
GHSA-xc7q-q62f-wcvr
2023-08-29T18:50:33Z
2022-05-17T04:58:35Z
null
['CVE-2013-6289']
Apache Solr for TYPO3 (solr) extension is vulnerable to Cross-site scripting (XSS)
Cross-site scripting (XSS) vulnerability in the Apache Solr for TYPO3 (solr) extension before 2.8.3 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'apache-solr-for-typo3/solr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6289'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3-Solr/ext-solr/commit/57e3b06b498668e093b9b86f32f7509d12d6ae4e'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3-Solr/ext-solr/commit/7ed1e9fc03f2036d80a416178493da72c620f7e9'}, {'type': 'PA...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:50:33Z', 'nvd_published_at': '2013-10-28T22:55:00Z'}
1.4.0
GHSA-75p2-hgw4-g7f7
2023-09-26T20:43:47Z
2022-05-24T17:12:10Z
null
['CVE-2019-20627']
AutoUpdater.NET allows XXE
AutoUpdater.cs in AutoUpdater.NET before 1.5.8 allows XXE.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Autoupdater.NET.Official'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20627'}, {'type': 'WEB', 'url': 'https://github.com/ravibpatel/AutoUpdater.NET/commit/1dc25f2bea6ea522dbac1512b5563c4746d539c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ravibpatel/AutoUpdater.NET'}, {'type': 'WEB', 'url': 'https://github.co...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:29:18Z', 'nvd_published_at': '2020-03-23T17:15:00Z'}
1.4.0
GHSA-j762-mr2c-fmp9
2023-07-20T18:20:56Z
2022-05-13T01:18:33Z
null
['CVE-2018-0838']
ChakraCore RCE Vulnerability
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0838'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f82e7b4e561494a9ad79f2fe5c5aadcdf6ccce33'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0838'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:20:56Z', 'nvd_published_at': '2018-02-15T02:29:00Z'}
1.4.0
GHSA-538h-6rv2-wmj3
2023-07-31T20:28:04Z
2022-05-14T02:24:33Z
null
['CVE-2016-3214']
ChakraCore RCE Vulnerability
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3199.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3214'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/0b9f3cdd57cb09388fcf898edc537169c45a7345'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-068'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T20:28:04Z', 'nvd_published_at': '2016-06-16T01:59:00Z'}