schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-7gcp-2gmq-w3xh | 2023-03-09T00:37:49Z | 2022-05-13T01:38:25Z | null | ['CVE-2017-0899'] | RubyGems Code Injection vulnerability | RubyGems prior to 2.6.13 is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0899'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/1bcbc7fe637b03145401ec9c094066285934a7f1'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/ef0aa611effb5f54d40c7fba6e8235eb43c5a491'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-150', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T00:37:49Z', 'nvd_published_at': '2017-08-31T20:29:00Z'} |
1.4.0 | GHSA-qx76-c53f-5c7q | 2022-09-12T15:59:43Z | 2022-05-14T01:40:50Z | null | ['CVE-2018-20583'] | PHP League CommonMark vulnerable to Cross-Site Scripting (XSS) | Cross-site scripting (XSS) vulnerability in the PHP League CommonMark library versions 0.15.6 through 0.18.x before 0.18.1 allows remote attackers to insert unsafe URLs into HTML (even if allow_unsafe_links is false) via a newline character (e.g., writing javascript as javascri%0apt). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'league/commonmark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.6'}, {'fixed': '0.18.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20583'}, {'type': 'WEB', 'url': 'https://github.com/thephpleague/commonmark/issues/337'}, {'type': 'WEB', 'url': 'https://commonmark.thephpleague.com/changelog/'}, {'type': 'PACKAGE', 'url': 'https://github.com/thephpleague/commonmark'}, {'type': '... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T15:59:43Z', 'nvd_published_at': '2018-12-30T05:29:00Z'} |
1.4.0 | GHSA-v5p2-vg3c-pmrr | 2023-09-22T21:08:02Z | 2022-05-01T18:33:34Z | null | ['CVE-2007-5461'] | Apache Tomcat Path Traversal Vulnerability | Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'last_affected': '4.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5461'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/37243'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'typ... | {'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:08:02Z', 'nvd_published_at': '2007-10-15T18:17:00Z'} |
1.4.0 | GHSA-7388-7vq2-m4f4 | 2023-08-03T19:39:57Z | 2022-05-24T17:44:52Z | null | ['CVE-2021-28145'] | Concrete CMS Cross-site Scripting via Survey Blocks | Concrete CMS (formerly concrete5) before 8.5.5 allows remote authenticated users to conduct Cross-site Scripting (XSS) attacks via a crafted survey block. This requires at least Editor privileges. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28145'}, {'type': 'WEB', 'url': 'https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes'}, {'type': 'WEB', 'url': 'https://github.com/S1lkys/CVE-2021-40101'}, {'type': 'WEB', 'url': 'https://www.concrete5.org/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T22:52:02Z', 'nvd_published_at': '2021-03-18T16:15:00Z'} |
1.4.0 | GHSA-mwh9-gr45-xvv4 | 2023-09-25T19:47:00Z | 2022-05-24T16:55:15Z | null | ['CVE-2019-15630'] | Mule modules contain Directory Traversal | Directory Traversal in APIkit, http-connector, and OAuth2 Provider modules in Mulesoft 3.x, 4.x and Mulesoft API Gateway (all versions) released before August 1, 2019 allow remote attackers to read files accessible to the Mule process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mule.runtime:mule'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'last_affected': '4.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15630'}, {'type': 'PACKAGE', 'url': 'https://github.com/mulesoft/mule'}, {'type': 'WEB', 'url': 'https://help.mulesoft.com/s/article/Directory-traversal-vulnerability-affecting-runtimes-of-MuleSoft-customers-running-certain-use-cases-of-Mule-flows-... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:35:58Z', 'nvd_published_at': '2019-08-30T17:15:00Z'} |
1.4.0 | GHSA-3747-gjc9-vvg6 | 2023-08-29T18:13:58Z | 2022-05-17T04:19:03Z | null | ['CVE-2013-6919'] | phpThumb is vulnerable to Server-Side Request Forgery (SSRF) | The default configuration of phpThumb before 1.7.12 has a false value for the disable_debug option, which allows remote attackers to conduct Server-Side Request Forgery (SSRF) attacks via the src parameter. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'james-heinrich/phpthumb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6919'}, {'type': 'WEB', 'url': 'https://github.com/JamesHeinrich/phpThumb/commit/457a37d4a22ac9cdbbfe19577376622e58df81b0'}, {'type': 'PACKAGE', 'url': 'https://github.com/JamesHeinrich/phpThumb'}, {'type': 'WEB', 'url': 'https://github.com/JamesHe... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:13:58Z', 'nvd_published_at': '2014-12-27T18:59:00Z'} |
1.4.0 | GHSA-wp2f-hrg2-3r5m | 2022-07-01T19:32:51Z | 2022-05-14T00:58:02Z | null | ['CVE-2017-15691'] | Improper Restriction of XML External Entity Reference in Apache uimaj | In Apache uimaj prior to 2.10.2, Apache uimaj 3.0.0-xxx prior to 3.0.0-beta, Apache uima-as prior to 2.10.2, Apache uimaFIT prior to 2.4.0, Apache uimaDUCC prior to 2.2.2, this vulnerability relates to an XML external entity expansion (XXE) capability of various XML parsers. UIMA as part of its configuration and operat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.uima:uimafit-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.uima:uimaj-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15691'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1545'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/00407c65738e625a8cc9d732923a4ab2d8299603cc7c7e5cc2da9c79@%3Ccommits.uima.apache.org%3E'}, {'type': 'WEB... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T19:32:51Z', 'nvd_published_at': '2018-04-26T17:29:00Z'} |
1.4.0 | GHSA-xcvr-qv8h-m7xw | 2022-10-25T17:35:35Z | 2022-05-13T01:07:06Z | null | ['CVE-2018-0875'] | .NET Core Denial of Service Vulnerability | .NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka ".NET Core Denial of Service Vulnerability". | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.Jit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.Jit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.7'}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0875'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/62'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0522'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/adviso... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T17:35:35Z', 'nvd_published_at': '2018-03-14T17:29:00Z'} |
1.4.0 | GHSA-92j2-gg59-4572 | 2023-07-31T19:12:01Z | 2022-05-14T02:23:12Z | null | ['CVE-2016-3382'] | ChakraCore RCE Vulnerability | The scripting engines in Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, as demonstrated by the Chakra JavaScript engine, aka "Scripting Engine Memory Corruption Vulnerability." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3382'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1737'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f05c42e64c3b2d057ae1a52fe1917af26c9f2737'}, {'type': 'WEB', 'url': 'https://docs.microso... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:12:01Z', 'nvd_published_at': '2016-10-14T02:59:00Z'} |
1.4.0 | GHSA-q397-w28f-jx97 | 2022-12-20T22:41:34Z | 2022-05-24T17:19:04Z | null | ['CVE-2020-2194'] | Stored XSS vulnerability in Jenkins ECharts API Plugin | ECharts API Plugin 4.7.0-3 and earlier does not escape the display name of the builds in the trend chart.
This results in a stored cross-site scripting (XSS) vulnerability that can be exploited by users with Run/Update permission.
ECharts API Plugin 4.7.0-4 escapes the display name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:echarts-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.0-4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2194'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/echarts-api-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1842'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:41:34Z', 'nvd_published_at': '2020-06-03T13:15:00Z'} |
1.4.0 | GHSA-44pw-h2cw-w3vq | 2022-05-23T20:18:14Z | 2022-05-23T20:18:14Z | null | ['CVE-2022-29167'] | Uncontrolled Resource Consumption in Hawk | Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hawk'}, 'ecosystem_specific': {'affected_functions': ['hawk.utils.parseHost']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mozilla/hawk/security/advisories/GHSA-44pw-h2cw-w3vq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29167'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/hawk/pull/286'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/hawk/commit/d10d72ca8... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-23T20:18:14Z', 'nvd_published_at': '2022-05-05T23:15:00Z'} |
1.4.0 | GHSA-wqjj-hx84-v449 | 2023-09-05T13:57:24Z | 2022-05-17T03:07:04Z | null | ['CVE-2014-0474'] | Django Vulnerable to MySQL Injection | The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to "MySQL typec... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.6'}]}]}, {'package': {'ecosystem': 'PyP... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0474'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/5f0829a27e85d89ad8c433f5c6a7a7d17c9e9292'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/985434fb1d6bf2335bf96c6ebf91c3674f1f399f'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:58:21Z', 'nvd_published_at': '2014-04-23T15:55:00Z'} |
1.4.0 | GHSA-ww6f-76ff-phhj | 2023-07-31T20:29:04Z | 2022-05-14T02:24:35Z | null | ['CVE-2016-3202'] | ChakraCore RCE Vulnerability | The Microsoft (1) Chakra JavaScript, (2) JScript, and (3) VBScript engines, as used in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3202'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/ff9067ebe9e1c92eff4e25da95070bfd5942da07'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-063'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T20:29:04Z', 'nvd_published_at': '2016-06-16T01:59:00Z'} |
1.4.0 | GHSA-pwr7-j6g3-hmx6 | 2023-07-27T00:15:21Z | 2022-05-17T00:11:38Z | null | ['CVE-2017-17431'] | GeniXCMS XSS Vulnerability | GeniXCMS 1.1.5 has XSS via the from, id, lang, menuid, mod, q, status, term, to, or token parameter. NOTE: this might overlap CVE-2017-14761, CVE-2017-14762, or CVE-2017-14765. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'genix/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17431'}, {'type': 'WEB', 'url': 'https://code610.blogspot.com/2017/12/modus-operandi-genixcms-115.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T00:15:21Z', 'nvd_published_at': '2017-12-05T21:29:00Z'} |
1.4.0 | GHSA-gv85-wgxc-vc56 | 2023-08-03T22:44:43Z | 2022-05-14T00:57:47Z | null | ['CVE-2016-10321'] | web2py is vulnerable to password brute-force attack | web2py before 2.14.6 does not properly check if a host is denied before verifying passwords, allowing a remote attacker to perform brute-force attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'web2py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10321'}, {'type': 'WEB', 'url': 'https://github.com/web2py/web2py/issues/1585#issuecomment-284317919'}, {'type': 'WEB', 'url': 'https://github.com/web2py/web2py/commit/944d8bd8f3c5cf8ae296fc03d149056c65358426'}, {'type': 'PACKAGE', 'url': 'https://... | {'cwe_ids': ['CWE-307'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:44:43Z', 'nvd_published_at': '2017-04-10T14:59:00Z'} |
1.4.0 | GHSA-x9fv-c87w-55wc | 2022-07-08T19:19:37Z | 2022-05-13T01:26:34Z | null | ['CVE-2013-4330'] | Improper Control of Generation of Code in Apache Camel | Apache Camel before 2.9.7, 2.10.0 before 2.10.7, 2.11.0 before 2.11.2, and 2.12.0 allows remote attackers to execute arbitrary simple language expressions by including "$simple{}" in a CamelFileName message header to a (1) FILE or (2) FTP producer. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4330'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87542'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E'}, ... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:19:37Z', 'nvd_published_at': '2013-10-04T17:55:00Z'} |
1.4.0 | GHSA-2pqc-gv8q-pvqv | 2023-08-03T19:53:31Z | 2022-05-17T01:57:52Z | null | ['CVE-2015-5081'] | django-cms CSRF Vulnerability | Cross-site request forgery (CSRF) vulnerability in django CMS before 3.0.14, 3.1.x before 3.1.1 allows remote attackers to manipulate privileged users into performing unknown actions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5081'}, {'type': 'WEB', 'url': 'https://github.com/django-cms/django-cms/commit/f77cbc607d6e2a62e63287d37ad320109a2cc78a'}, {'type': 'WEB', 'url': 'https://www.django-cms.org/en/blog/2015/06/27/311-3014-release/'}, {'type': 'WEB', 'url': 'http://ww... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T19:53:31Z', 'nvd_published_at': '2017-08-18T18:29:00Z'} |
1.4.0 | GHSA-985w-mqqp-7287 | 2023-09-26T19:07:28Z | 2022-05-24T17:00:25Z | null | ['CVE-2019-8120'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting (XSS) vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. An authenticated user can inject arbitrary Javascript code by manipulating section of a POST request related to customer's email address. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8120'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T17:47:56Z', 'nvd_published_at': '2019-11-05T23:15:00Z'} |
1.4.0 | GHSA-p97q-j98q-f98w | 2023-07-21T22:14:13Z | 2022-05-13T01:20:45Z | null | ['CVE-2018-8287'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-8242, CVE-2018-82... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8287'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5444'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/fa89a7031e75ca8b4a595765e897e8fc0d9fae76'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:14:13Z', 'nvd_published_at': '2018-07-11T00:29:00Z'} |
1.4.0 | GHSA-8f4c-h6m3-22rw | 2023-07-21T19:25:19Z | 2022-05-13T01:21:01Z | null | ['CVE-2018-8588'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8588'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5827'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c76da44c27fcf06ad5ac3ee6f8d45efb8d8bc04f'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:25:19Z', 'nvd_published_at': '2018-11-14T01:29:00Z'} |
1.4.0 | GHSA-ww7r-278h-48mh | 2023-07-20T13:09:39Z | 2022-05-24T17:36:17Z | null | ['CVE-2020-20136'] | QuantConnect Lean vulnerable to insecure deserialization | QuantConnect Lean versions from 2.3.0.0 to 2.4.0.1 are affected by an insecure deserialization vulnerability due to insecure configuration of TypeNameHandling property in Json.NET library. One may avoid this issue by only running Lean in an environment where data provided is trusted. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'QuantConnect.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0.0'}, {'last_affected': '2.4.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20136'}, {'type': 'WEB', 'url': 'https://github.com/QuantConnect/Lean/issues/3537'}, {'type': 'PACKAGE', 'url': 'https://github.com/QuantConnect/Lean'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T13:09:39Z', 'nvd_published_at': '2020-12-14T19:15:00Z'} |
1.4.0 | GHSA-4749-p7rx-8jjj | 2023-08-02T20:59:34Z | 2022-05-14T03:07:28Z | null | ['CVE-2015-3220'] | tlslite remote denial of service vulnerability | The tlslite library before 0.4.9 for Python allows remote attackers to trigger a denial of service (runtime exception and process crash). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tlslite'}, 'ecosystem_specific': {'affected_functions': ['tlslite.tlsrecordlayer.TLSRecordLayer._decryptRecord']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3220'}, {'type': 'WEB', 'url': 'https://github.com/trevp/tlslite/commit/aca8d4f898b436ff6754e1a9ab96cae976c8a853'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1254215'}, {'type': 'WEB', 'url': 'https://groups.google.com/for... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T20:59:14Z', 'nvd_published_at': '2017-06-13T16:29:00Z'} |
1.4.0 | GHSA-fw42-4mq4-4qpq | 2023-07-21T20:26:56Z | 2022-05-13T01:20:55Z | null | ['CVE-2018-8500'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8500'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5764'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cd84a0b85b4b2bcf1653c7bfd5426bbc72b2b216'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:26:56Z', 'nvd_published_at': '2018-10-10T13:29:00Z'} |
1.4.0 | GHSA-h892-x453-86wc | 2023-07-20T23:22:46Z | 2022-05-13T01:19:33Z | null | ['CVE-2018-18240'] | Pippo RCE Vulnerability | Pippo through 1.11.0 allows remote code execution via a command to java.lang.ProcessBuilder because the XstreamEngine component does not use XStream's available protection mechanisms to restrict unmarshalling. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'ro.pippo:pippo-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18240'}, {'type': 'WEB', 'url': 'https://github.com/pippo-java/pippo/issues/454'}, {'type': 'WEB', 'url': 'https://github.com/pippo-java/pippo/commit/c6b26551a82d2dd32097fcb17c13c3b830916296'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T23:22:46Z', 'nvd_published_at': '2018-10-11T07:29:00Z'} |
1.4.0 | GHSA-c445-xm3f-hmfh | 2022-12-29T01:35:38Z | 2022-05-24T17:28:25Z | null | ['CVE-2020-2258'] | Incorrect permission check in Health Advisor by CloudBees Plugin | Health Advisor by CloudBees Plugin 3.2.0 and earlier does not correctly perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to view an administrative configuration page.
Health Advisor by CloudBees Plugin 3.2.1 requires Overall/Administer to view its administrative confi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-jenkins-advisor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2258'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cloudbees-jenkins-advisor-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1998'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists... | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:35:38Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-fg4r-f9j2-36mw | 2023-02-08T17:54:38Z | 2022-05-17T03:51:00Z | null | ['CVE-2013-2034'] | Jenkins Cross-Site Request Forgery vulnerabilities | Multiple cross-site request forgery (CSRF) vulnerabilities in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code or (2) initiate deployment of b... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.509.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.513'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2034'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2013:1032'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-2034'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=958958'}, {'type'... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:54:38Z', 'nvd_published_at': '2014-05-14T19:55:00Z'} |
1.4.0 | GHSA-68g5-8q7f-m384 | 2022-06-30T21:21:47Z | 2022-05-14T00:58:29Z | null | ['CVE-2017-7675'] | Improper Limitation of a Pathname to a Restricted Directory in Apache Tomcat | The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M21'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7675'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/cf181edc9a8c239cde704cffc3c503425bdcae2b'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/dacb030b85fe0e0b3da87469e23d0f31252fdede'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T21:21:47Z', 'nvd_published_at': '2017-08-11T02:29:00Z'} |
1.4.0 | GHSA-q263-j3q9-g964 | 2023-07-31T22:23:29Z | 2022-05-13T01:24:45Z | null | ['CVE-2017-1000119'] | October CMS PHP Code Execution | October CMS build 412 is vulnerable to PHP code execution in the file upload functionality resulting in site compromise and possibly other applications on the server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.412'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000119'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}, {'type': 'WEB', 'url': 'http://octobercms.com/support/article/rn-8'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154390/October-CMS-Upload-Protection-... | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:23:29Z', 'nvd_published_at': '2017-10-05T01:29:00Z'} |
1.4.0 | GHSA-gw85-4gmf-m7rh | 2022-07-13T17:20:15Z | 2022-05-17T05:39:03Z | null | ['CVE-2011-1498'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache HttpClient | Apache HttpClient 4.x before 4.1.1 in Apache HttpComponents, when used with an authenticating proxy server, sends the Proxy-Authorization header to the origin server, which allows remote web servers to obtain sensitive information by logging this header. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1498'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=709531'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/HTTPCLIENT-1061'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:20:15Z', 'nvd_published_at': '2011-07-07T21:55:00Z'} |
1.4.0 | GHSA-372q-33vh-8mpc | 2022-11-03T18:47:34Z | 2022-05-14T01:10:15Z | null | ['CVE-2017-15706'] | Inconsistent documentation in Apache Tomcat | As part of the fix for bug 61201, the documentation for Apache Tomcat 9.0.0.M22 to 9.0.1, 8.5.16 to 8.5.23, 8.0.45 to 8.0.47 and 7.0.79 to 7.0.82 included an updated description of the search algorithm used by the CGI Servlet to identify which script to execute. The update was not correct. As a result, some scripts may... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M22'}, {'fixed': '9.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.16'}, {'fixed'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15706'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8... | {'cwe_ids': ['CWE-1068'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:47:34Z', 'nvd_published_at': '2018-01-31T14:29:00Z'} |
1.4.0 | GHSA-qv62-xfj6-32xm | 2023-05-04T21:14:40Z | 2022-05-17T00:16:50Z | null | ['CVE-2015-4020'] | RubyGems Improper Input Validation vulnerability | RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.3.x before 2.4.8 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0.rc.1'}, {'fixed': '2.2.5'}]}]},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4020'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/5c7bfb5'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubygems/rubygems'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-04T21:14:40Z', 'nvd_published_at': '2015-08-25T17:59:00Z'} |
1.4.0 | GHSA-fp6p-5xvw-m74f | 2023-07-31T22:16:33Z | 2022-05-17T01:09:58Z | null | ['CVE-2016-2513'] | Django User Enumeration Vulnerability | The password hasher in `contrib/auth/hashers.py` in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2513'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160322001143/http://www.securitytracker.com/id/1035152'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:16:33Z', 'nvd_published_at': '2016-04-08T15:59:00Z'} |
1.4.0 | GHSA-2w4x-rxp7-grg7 | 2022-06-30T17:37:29Z | 2022-05-13T01:01:02Z | null | ['CVE-2018-1000192'] | Exposure of Sensitive Information to an Unauthorized Actor in Jenkins | A information exposure vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in AboutJenkins.java, ListPluginsCommand.java that allows users with Overall/Read access to enumerate all installed plugins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.107.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.107.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000192'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/7c5b41bfd5d8004f82684a9168dd627e20ea5f35'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/809916b59b7c7678dc3c1c76338452121fed1424'}, {'type': 'PAC... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T17:37:29Z', 'nvd_published_at': '2018-06-05T21:29:00Z'} |
1.4.0 | GHSA-x6jw-2f23-mc5j | 2022-06-30T19:40:26Z | 2022-05-13T01:01:02Z | null | ['CVE-2018-1000068'] | Exposure of Sensitive Information to an Unauthorized Actor in Jenkins | An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenkins home directory is on a case-insensitive file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.89.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.89.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000068'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/8830d68f5fe21f344be3496984bc4470bfcd0564'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advis... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T19:40:26Z', 'nvd_published_at': '2018-02-16T00:29:00Z'} |
1.4.0 | GHSA-95m2-p98f-24r5 | 2022-11-08T14:32:31Z | 2022-05-14T03:35:52Z | null | ['CVE-2017-15693'] | Apache Geode unsafe deserialization of application objects | In Apache Geode before v1.4.0, the Geode server stores application objects in serialized form. Certain cluster operations and API invocations cause these objects to be deserialized. A user with DATA:WRITE access to the cluster may be able to cause remote code execution if certain classes are present on the classpath. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15693'}, {'type': 'WEB', 'url': 'https://github.com/apache/geode/pull/1166'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/GEODE-3923'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cc3ec1d06062f54fdaa0357874c1d148f... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:32:31Z', 'nvd_published_at': '2018-02-27T15:29:00Z'} |
1.4.0 | GHSA-p258-xmh3-72pv | 2023-02-08T18:04:25Z | 2022-05-17T04:41:34Z | null | ['CVE-2014-0167'] | OpenStack Compute (Nova) allows remote authenticated users to gain privileges via API requests | The Nova EC2 API security group implementation in OpenStack Compute (Nova) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 does not enforce RBAC policies for (1) add_rules, (2) remove_rules, (3) destroy, and other unspecified methods in compute/api.py when using non-default policies, which allows remote authent... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2013.1.0'}, {'fixed': '2013.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0167'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1084'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-0167'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1084868'}, {'type... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:04:25Z', 'nvd_published_at': '2014-04-15T14:55:00Z'} |
1.4.0 | GHSA-6xhj-p29v-82j8 | 2022-11-22T19:25:07Z | 2022-05-13T01:53:29Z | null | ['CVE-2018-8028'] | Apache Sentry may allow attacker to access/remove data from Sentry protected table | An authenticated user can execute ALTER TABLE EXCHANGE PARTITIONS without being authorized by Apache Sentry before 2.0.1. This can allow an attacker unauthorized access to the partitioned data of a Sentry protected table and can allow an attacker to remove data from a Sentry protected table. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sentry:sentry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8028'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/SENTRY/Vulnerabilities+found+in+Apache+Sentry'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/sentry'}] | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:25:07Z', 'nvd_published_at': '2018-08-23T15:29:00Z'} |
1.4.0 | GHSA-qwm8-vgm6-f86p | 2022-06-01T19:47:27Z | 2022-05-13T01:15:06Z | null | ['CVE-2019-1003032'] | Script security sandbox bypass in Jenkins Email Extension Plugin | A sandbox bypass vulnerability exists in Jenkins Email Extension Plugin 2.64 and earlier in pom.xml, src/main/java/hudson/plugins/emailext/ExtendedEmailPublisher.java, src/main/java/hudson/plugins/emailext/plugins/content/EmailExtScript.java, src/main/java/hudson/plugins/emailext/plugins/content/ScriptContent.java, src... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.65'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003032'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/email-ext-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1340'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107476'}] | {'cwe_ids': ['CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:47:27Z', 'nvd_published_at': '2019-03-08T21:29:00Z'} |
1.4.0 | GHSA-mrr8-fcg7-p2wg | 2022-12-20T21:28:10Z | 2022-05-24T17:25:24Z | null | ['CVE-2020-2234'] | Missing permission check in Jenkins Pipeline Maven Integration Plugin allow capturing credentials | Pipeline Maven Integration Plugin 3.8.2 and earlier does not perform a permission check in a method implementing form validation.
This allows users with Overall/Read access to Jenkins to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capt... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-maven'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2234'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-maven-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1794%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T21:28:10Z', 'nvd_published_at': '2020-08-12T14:15:00Z'} |
1.4.0 | GHSA-g67x-mgrv-m3gv | 2023-07-13T17:07:42Z | 2022-05-24T17:10:58Z | null | ['CVE-2020-0812'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based)L, aka Chakra Scripting Engine Memory Corruption Vulnerability. This CVE ID is unique from CVE-2020-0811. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0812'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6385'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6385/commits/bdd48f21a93bd9dc7dd5f783b58df8bef72583c4'}, {'type': 'PACKAGE', 'url': 'https... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:07:42Z', 'nvd_published_at': '2020-03-12T16:15:00Z'} |
1.4.0 | GHSA-rqw2-hhrf-7936 | 2023-07-13T17:10:16Z | 2022-05-24T17:17:23Z | null | ['CVE-2020-12692'] | OpenStack Keystone does not check signature TTL of the EC2 credential auth method | An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 15.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12692'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/keystone/+bug/1872737'}, {'type': 'WEB', 'url': 'https://opendev.org/openstack/keystone/commit/ab89ea749013e7f2c46260f68504f5687763e019'}, {'type': 'WEB', 'url': 'https://security.openstac... | {'cwe_ids': ['CWE-311', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:10:16Z', 'nvd_published_at': '2020-05-07T00:15:00Z'} |
1.4.0 | GHSA-gp69-xcm6-ffqj | 2023-08-04T21:55:11Z | 2022-05-17T03:03:31Z | null | ['CVE-2016-4808'] | Web2py Cross-Site Request Forgery vulnerability | Web2py versions 2.14.5 and below was affected by CSRF (Cross Site Request Forgery) vulnerability, which allows an attacker to trick a logged-in administrator into performing unwanted actions i.e An attacker can trick a victim into disable the installed application just by visiting a URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'web2py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.14.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4808'}, {'type': 'PACKAGE', 'url': 'https://github.com/web2py/web2py'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/39821/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/137070/Web2py-2.14.5-CSRF-XSS-Local-File-Incl... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:55:11Z', 'nvd_published_at': '2017-01-11T16:59:00Z'} |
1.4.0 | GHSA-2w26-gmqm-mc5p | 2023-09-25T18:57:41Z | 2022-05-24T16:52:22Z | null | ['CVE-2019-7855'] | Magento 2 Community Cryptographic Flaw | A cryptograhic flaw in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 could be abused by an unauthenticated user to discover an invariant used in gift card generation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7855'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}] | {'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:19:49Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-m2r2-qc49-gqw4 | 2023-07-25T20:02:22Z | 2022-05-14T03:25:24Z | null | ['CVE-2018-7035'] | Gleez CMS Stored XSS | Cross-site scripting (XSS) vulnerability in Gleez CMS 1.2.0 and 2.0 might allow remote attackers (users) to inject JavaScript via HTML content in an editor, which will result in Stored XSS when an Administrator tries to edit the same content, as demonstrated by use of the source editor for HTML mode in an Add Blog acti... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'gleez/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'gleez/cms'}, 'ecosystem_specific': {'affected_functions': [''... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7035'}, {'type': 'WEB', 'url': 'https://github.com/gleez/cms/issues/794'}, {'type': 'WEB', 'url': 'https://github.com/gleez/cms/issues/796'}, {'type': 'WEB', 'url': 'https://github.com/gleez/cms/commit/d4ad1844e9fe6e2b9b92dfb351fb7e01047f9565'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T20:02:22Z', 'nvd_published_at': '2018-04-05T14:29:00Z'} |
1.4.0 | GHSA-gvc8-xjfp-6569 | 2023-08-01T19:50:39Z | 2022-05-13T01:13:58Z | null | ['CVE-2015-8606'] | Silverstripe CMS XSS Vulnerability | Multiple cross-site scripting (XSS) vulnerabilities in SilverStripe CMS & Framework before 3.1.16 and 3.2.0 before 3.2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) Locale or (2) FailedLoginCount parameter to `admin/security/EditForm/field/Members/item/new/ItemEditForm`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.15'}}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8606'}, {'type': 'WEB', 'url': 'https://cybersecurityworks.com/zerodays/cve-2015-8606-silverstripe.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2015/Dec/55'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:50:39Z', 'nvd_published_at': '2016-04-13T15:59:00Z'} |
1.4.0 | GHSA-ff4w-8chr-w2x9 | 2023-08-25T21:15:54Z | 2022-05-24T16:44:03Z | null | ['CVE-2019-11401'] | SiteServer CMS RCE via unsafe file upload | A issue was discovered in SiteServer CMS prior to version 6.12. It allows remote attackers to execute arbitrary code because an administrator can add the permitted file extension `.aassp`, which is converted to `.asp` because the "as" substring is deleted. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'sscms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11401'}, {'type': 'WEB', 'url': 'https://github.com/siteserver/cms/issues/1858'}, {'type': 'WEB', 'url': 'https://github.com/siteserver/cms/commit/a7edb9ce3f9b52be3d18fa8a0e44931264e22436#diff-c8a06aaffb97eb2f4c587c1786906edd49dea574d063f74a59d9653... | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T20:14:41Z', 'nvd_published_at': '2019-04-22T11:29:00Z'} |
1.4.0 | GHSA-2x2q-2xpv-mcf9 | 2023-09-26T19:10:43Z | 2022-05-24T17:00:25Z | null | ['CVE-2019-8127'] | Magento 2 Community Edition SQLi Vulnerability | A SQL injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with privileges to an account with Newsletter Template editing permission could exfiltrate the Admin login data, and reset their password, effectively performing a privilege escalation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8127'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T17:58:21Z', 'nvd_published_at': '2019-11-05T23:15:00Z'} |
1.4.0 | GHSA-77xq-7c6p-6xp6 | 2023-08-28T23:21:08Z | 2022-05-05T00:29:09Z | null | ['CVE-2013-2095'] | RubyGem openshift-origin-controller is vulnerable to command injection | rubygem-openshift-origin-controller: API can be used to create applications via cartridge_cache.rb URI.prase() to perform command injection | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'openshift-origin-controller'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2095'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2013-2095'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2095'}, {'type': 'PACKAGE', 'url': 'https://github.com/openshift/origin-server'}, {... | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:21:08Z', 'nvd_published_at': '2019-12-10T14:15:00Z'} |
1.4.0 | GHSA-qf3f-7x69-qfv3 | 2023-07-31T18:48:27Z | 2022-05-14T03:14:46Z | null | ['CVE-2016-6622'] | phpMyAdmin DoS Vulnerability | An issue was discovered in phpMyAdmin. An unauthenticated user is able to execute a denial-of-service (DoS) attack by forcing persistent connections when phpMyAdmin is running with `$cfg['AllowArbitraryServer']=true`. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4'}, {'fixed': '4.4.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6622'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210125183746/http://ww... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:48:27Z', 'nvd_published_at': '2016-12-11T02:59:00Z'} |
1.4.0 | GHSA-38hf-xjmx-jrh8 | 2022-11-04T22:46:06Z | 2022-05-14T02:59:36Z | null | ['CVE-2018-14380'] | Cross-site Scripting in Graylog Server | In Graylog before 2.4.6, XSS was possible in typeahead components, related to components/common/TypeAheadInput.jsx and components/search/QueryInput.ts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.graylog2:graylog2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14380'}, {'type': 'WEB', 'url': 'https://github.com/Graylog2/graylog2-server/pull/4904'}, {'type': 'PACKAGE', 'url': 'https://github.com/Graylog2/graylog2-server'}, {'type': 'WEB', 'url': 'https://www.graylog.org/post/announcing-the-release-of-gray... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T22:46:06Z', 'nvd_published_at': '2018-07-18T15:29:00Z'} |
1.4.0 | GHSA-pj45-8vhc-mh2f | 2022-11-22T19:38:17Z | 2022-05-14T03:45:42Z | null | ['CVE-2017-1000402'] | Jenkins Swarm Plugin Client vulnerable to man-in-the-middle attacks | Jenkins Swarm Plugin Client 3.4 and earlier bundled a version of the commons-httpclient library with the vulnerability CVE-2012-6153 that incorrectly verified SSL certificates, making it susceptible to man-in-the-middle attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:swarm-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:swarm-plug... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000402'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-10-11/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:38:17Z', 'nvd_published_at': '2018-01-26T02:29:00Z'} |
1.4.0 | GHSA-f4gq-7hvf-fjm3 | 2022-12-22T14:04:17Z | 2022-05-24T17:12:40Z | null | ['CVE-2020-2170'] | Stored XSS vulnerability in Jenkins RapidDeploy Plugin | RapidDeploy Plugin 4.2 and earlier does not escape package names in its displayed table of packages obtained from a remote server. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to configure jobs.
RapidDeploy Plugin 4.2.1 escapes package names. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rapiddeploy-jenkins'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2170'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rapiddeploy-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1676'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T14:04:17Z', 'nvd_published_at': '2020-03-25T17:15:00Z'} |
1.4.0 | GHSA-56hf-w8gm-448q | 2023-09-26T17:48:33Z | 2022-05-24T17:00:24Z | null | ['CVE-2019-8092'] | Magento 2 Community Edition XSS Vulnerability | A reflected cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code via email template preview. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8092'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:13:35Z', 'nvd_published_at': '2019-11-05T23:15:00Z'} |
1.4.0 | GHSA-fqg2-c97r-rqcj | 2022-11-03T23:19:45Z | 2022-05-13T01:50:55Z | null | ['CVE-2018-1999040'] | Exposure of Sensitive Information in Jenkins Kubernetes Plugin | An exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.10.1 and earlier in KubernetesCloud.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.csanchez.jenkins.plugins:kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999040'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-30/#SECURITY-1016'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:19:45Z', 'nvd_published_at': '2018-08-01T13:29:00Z'} |
1.4.0 | GHSA-h5g4-ppwx-48q2 | 2022-05-24T22:06:50Z | 2022-05-24T22:06:50Z | null | ['CVE-2022-29194'] | Missing validation causes denial of service via `DeleteSessionTensor` | ### Impact
The implementation of [`tf.raw_ops.DeleteSessionTensor`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/session_ops.cc#L128-L144) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denia... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h5g4-ppwx-48q2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29194'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/cff267650c6a1b266e4b4500f69fbc49cdd773c5'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:06:50Z', 'nvd_published_at': '2022-05-20T21:15:00Z'} |
1.4.0 | GHSA-3m99-h3hp-w9j7 | 2023-08-15T22:30:28Z | 2022-05-13T01:12:40Z | null | ['CVE-2014-3545'] | Moodle remote code execution via quiz questions | Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote authenticated users to execute arbitrary code via a calculated question in a quiz. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1'}]}], 'versions': ['2.7.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3545'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/blob/1474f74687dda57c7d011b92d16f25b9870d2799/question/type/calculated/question.php#L426'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T22:30:28Z', 'nvd_published_at': '2014-07-29T11:10:00Z'} |
1.4.0 | GHSA-8x6c-375h-pm4f | 2022-11-02T00:05:07Z | 2022-05-24T16:58:49Z | null | ['CVE-2019-10448'] | Cleartext Storage of Sensitive Information in Jenkins Extensive Testing Plugin | Jenkins Extensive Testing Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'jenkins.xtc:extensivetesting'}, 'versions': ['1.4.4b']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10448'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1432'}] | {'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:05:07Z', 'nvd_published_at': '2019-10-16T14:15:00Z'} |
1.4.0 | GHSA-q586-7p8w-9pg8 | 2022-11-04T18:44:00Z | 2022-05-17T01:17:12Z | null | ['CVE-2017-3155'] | Cross-site Scripting in Apache Atlas | Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to cross frame scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:atlas-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1-incubating'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3155'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/atlas'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4a4fef91e067fd0d9da569e30867c1fa65e2a0520acde71ddefee0ea@%3Cdev.atlas.apache.org%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:44:00Z', 'nvd_published_at': '2017-08-29T20:29:00Z'} |
1.4.0 | GHSA-q326-jhw3-699g | 2022-07-06T20:15:42Z | 2022-05-17T00:36:05Z | null | ['CVE-2015-4706'] | Improper Neutralization of Input During Web Page Generation in IPython | Cross-site scripting (XSS) vulnerability in IPython 3.x before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/contents path. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4706'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/7222bd53ad089a65fd610fab4626f9d0ab47dfce'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/c2078a53543ed502efd968649fee1125e0eb549c'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:15:42Z', 'nvd_published_at': '2017-09-21T14:29:00Z'} |
1.4.0 | GHSA-579v-mp3v-rrw5 | 2022-09-12T14:46:34Z | 2022-05-14T01:09:51Z | null | ['CVE-2011-4969'] | jQuery vulnerable to Cross-Site Scripting (XSS) | Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-4969'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/commit/db9e023e62c1ff5d8f21ed9868ab6878da2005e9'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T14:46:34Z', 'nvd_published_at': '2013-03-08T22:55:00Z'} |
1.4.0 | GHSA-5j48-826p-2w9r | 2023-07-20T18:25:58Z | 2022-05-13T01:18:32Z | null | ['CVE-2018-0834'] | ChakraCore RCE Vulnerability | Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0835, CVE-2018-0836, CVE-2018-0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0834'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6cd503299eac4a5b5ffc0c5bb0d072861f60e183'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0834'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:25:58Z', 'nvd_published_at': '2018-02-15T02:29:00Z'} |
1.4.0 | GHSA-f24j-f97w-65h8 | 2023-07-20T00:07:10Z | 2022-05-24T16:57:58Z | null | ['CVE-2018-21025'] | Centreon Privilege Escalation | In Centreon VM through 19.04.3, centreon-backup.pl allows attackers to become root via a crafted script, due to incorrect rights of sourced configuration files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '19.04.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21025'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/issues/7082'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2019/10/08/1'}] | {'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T00:07:10Z', 'nvd_published_at': '2019-10-08T13:15:00Z'} |
1.4.0 | GHSA-p4xg-cpr9-vwvj | 2023-07-28T21:38:39Z | 2022-05-13T01:38:28Z | null | ['CVE-2016-9589'] | Red Hat Wildfly DoS | Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to "max-headers" (default 200) * "max-... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 11.0.0.Beta1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9589'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0872'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0873'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3454'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T21:38:39Z', 'nvd_published_at': '2018-03-12T15:29:00Z'} |
1.4.0 | GHSA-vq79-mgpx-2wx4 | 2023-07-31T22:21:37Z | 2022-05-17T02:16:00Z | null | ['CVE-2016-4431'] | Apache Struts Access Control Redirect | Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks by leveraging a default method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts-master'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.20'}, {'last_affected': '2.3.28.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4431'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1348252'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-040.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123145002/http://www.securityfocus... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:21:37Z', 'nvd_published_at': '2016-07-04T22:59:00Z'} |
1.4.0 | GHSA-j556-q367-2gw6 | 2023-08-16T23:07:18Z | 2022-05-17T03:56:49Z | null | ['CVE-2014-6276'] | Roundup sensitive data disclosure vulnerability | schema.py in Roundup before 1.5.1 does not properly limit attributes included in default user permissions, which might allow remote authenticated users to obtain sensitive user information by viewing user details. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'roundup'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6276'}, {'type': 'WEB', 'url': 'https://sourceforge.net/p/roundup/code/ci/tip/tree/CHANGES.txt'}, {'type': 'WEB', 'url': 'http://hg.code.sf.net/p/roundup/code/rev/a403c29ffaf9'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3502'... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:07:18Z', 'nvd_published_at': '2016-04-13T14:59:00Z'} |
1.4.0 | GHSA-rm7v-gqfg-p2wc | 2022-07-07T22:38:37Z | 2022-05-14T01:11:29Z | null | ['CVE-2014-3603'] | Improper Validation of Certificate with Host Mismatch in Shibboleth Identity Provider and OpenSAML Java | The (1) HttpResource and (2) FileBackedHttpResource implementations in Shibboleth Identity Provider (IdP) before 2.4.1 and OpenSAML Java 2.6.2 do not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'edu.internet2.middleware:shibboleth-identityprovider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opensaml:opensaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3603'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1131823'}, {'type': 'WEB', 'url': 'http://shibboleth.net/community/advisories/secadv_20140813.txt'}] | {'cwe_ids': ['CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:38:37Z', 'nvd_published_at': '2019-04-04T14:29:00Z'} |
1.4.0 | GHSA-v38p-mqq3-m6v5 | 2023-07-26T19:14:49Z | 2022-05-13T01:38:14Z | null | ['CVE-2017-12158'] | Keycloak Reflected XSS | It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12158'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2904'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2905'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2906'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T19:14:49Z', 'nvd_published_at': '2017-10-26T17:29:00Z'} |
1.4.0 | GHSA-cxwh-vmhg-39r2 | 2022-07-08T19:14:16Z | 2022-05-17T01:36:04Z | null | ['CVE-2013-2254'] | Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Sling | The deepGetOrCreateNode function in impl/operations/AbstractCreateOperation.java in org.apache.sling.servlets.post.bundle 2.2.0 and 2.3.0 in Apache Sling does not properly handle a NULL value that returned when the session does not have permissions to the root node, which allows remote attackers to cause a denial of se... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2254'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87765'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-2913'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/sling-dev/201... | {'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:14:16Z', 'nvd_published_at': '2013-10-17T23:55:00Z'} |
1.4.0 | GHSA-cvcf-w75c-gw5r | 2023-09-26T16:37:45Z | 2022-05-24T16:58:52Z | null | ['CVE-2019-13116'] | Mulesoft Mule Unsafe Deserialization | The MuleSoft Mule runtime engine before 3.8.0 allows remote attackers to execute arbitrary code because of Java Deserialization, related to Apache Commons Collections. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mule.runtime:mule'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13116'}, {'type': 'WEB', 'url': 'https://docs.mulesoft.com/release-notes/mule-runtime/mule-3.8.0-release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/mulesoft/mule'}, {'type': 'WEB', 'url': 'https://threat.tevora.com/mulesoft-3-8-unauthe... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:23:50Z', 'nvd_published_at': '2019-10-16T20:15:00Z'} |
1.4.0 | GHSA-c3mp-9vx3-2rvv | 2023-07-11T00:13:01Z | 2022-05-24T17:42:35Z | null | ['CVE-2021-3396'] | OpenNMS Horizon RCE via JEXL2 expression | OpenNMS Meridian 2016, 2017, 2018 before 2018.1.25, 2019 before 2019.1.16, and 2020 before 2020.1.5, Horizon 1.2 through 27.0.4, and Newts <1.5.3 has Incorrect Access Control, which allows local and remote code execution using JEXL expressions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '27.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 27.0.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.opennms.features:org.opennms.feature... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3396'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/3281'}, {'type': 'WEB', 'url': 'https://issues.opennms.org/browse/NMS-13103'}, {'type': 'WEB', 'url': 'https://www.opennms.com/en/blog/2021-02-16-cve-2021-3396-full-security-di... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:13:01Z', 'nvd_published_at': '2021-02-17T21:15:00Z'} |
1.4.0 | GHSA-gc62-j469-9gjm | 2023-08-01T23:31:39Z | 2022-05-24T16:47:29Z | null | ['CVE-2019-12274'] | Rancher Privilege Escalation Vulnerability | In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/l... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.27'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12274'}, {'type': 'WEB', 'url': 'https://forums.rancher.com/t/rancher-release-v2-2-4-addresses-rancher-cve-2019-12274-and-cve-2019-12303/14466'}] | {'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:31:39Z', 'nvd_published_at': '2019-06-06T16:29:00Z'} |
1.4.0 | GHSA-pjw3-c74j-m9fj | 2023-02-14T00:57:31Z | 2022-05-24T16:45:43Z | null | ['CVE-2016-7043'] | Password in config file in KIE server | It has been reported that KIE server and Busitess Central before version 7.21.0.Final contain username and password as plaintext Java properties. Any app deployed on the same server would have access to these properties, thus granting access to ther services. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.kie.server:kie-server-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.21.0.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7043'}, {'type': 'WEB', 'url': 'https://github.com/kiegroup/droolsjbpm-integration/pull/1273'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7043'}] | {'cwe_ids': ['CWE-260'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:57:31Z', 'nvd_published_at': '2019-05-15T16:29:00Z'} |
1.4.0 | GHSA-m269-wj6g-c459 | 2022-06-17T21:31:28Z | 2022-05-17T02:56:23Z | null | ['CVE-2016-10127'] | PySAML2 XML external entity attack | PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafted SAML XML request or response. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ecosystem_specific': {'affected_functions': ['saml2.create_class_from_xml_string', 'saml2.extension_element_from_string', 'saml2.soap.parse_soap_enveloped_saml_thingy', 'saml2.soap.class_instances_from_soap_enveloped_saml_thingies', 'saml2.soap.open_soap_envelope'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10127'}, {'type': 'WEB', 'url': 'https://github.com/rohe/pysaml2/issues/366'}, {'type': 'WEB', 'url': 'https://github.com/rohe/pysaml2/pull/379'}, {'type': 'WEB', 'url': 'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:31:28Z', 'nvd_published_at': '2017-03-03T15:59:00Z'} |
1.4.0 | GHSA-66x3-6cw3-v5gj | 2022-05-24T20:50:46Z | 2022-05-24T20:50:46Z | null | ['CVE-2022-29173'] | Improper Validation of Integrity Check Value in go-tuf | ### Impact
[go-tuf](https://github.com/theupdateframework/go-tuf) does not correctly implement the [client workflow](https://theupdateframework.github.io/specification/v1.0.28/index.html#detailed-client-workflow) for updating the metadata files for roles other than the root role. Specifically, checks for rollback atta... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/theupdateframework/go-tuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/theupdateframework/go-tuf/security/advisories/GHSA-66x3-6cw3-v5gj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29173'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/go-tuf/commit/ed6788e710fc3093a7ecc2d078bf734c0f200d8d'}, {'type'... | {'cwe_ids': ['CWE-354'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T20:50:46Z', 'nvd_published_at': '2022-05-05T23:15:00Z'} |
1.4.0 | GHSA-62pm-mgrh-7p69 | 2022-06-27T21:10:52Z | 2022-05-24T17:01:40Z | null | ['CVE-2019-16538'] | Incorrect Authorization in Jenkins Script Security Plugin | A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.67 and earlier related to the handling of default parameter expressions in closures allowed attackers to execute arbitrary code in sandboxed scripts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.68'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.67'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16538'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1658'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/11/21/1'}] | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T21:10:52Z', 'nvd_published_at': '2019-11-21T15:15:00Z'} |
1.4.0 | GHSA-p364-xfp2-f9rr | 2022-12-28T23:51:13Z | 2022-05-24T17:22:18Z | null | ['CVE-2020-2203'] | CSRF vulnerability in Jenkins Fortify on Demand Plugin | A cross-site request forgery vulnerability in Jenkins Fortify on Demand Plugin 5.0.1 and earlier allows attackers to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs.
This form validation method requires appropriate permission in Fortify on Demand Plugin 6.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fortify-on-demand-uploader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2203'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fortify-on-demand-uploader-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1691'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/os... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T23:51:13Z', 'nvd_published_at': '2020-07-02T15:15:00Z'} |
1.4.0 | GHSA-mp9r-rh95-f8f8 | 2023-07-17T20:46:51Z | 2022-05-24T16:52:25Z | null | ['CVE-2019-7885'] | Magento 2 Community Edition RCE Vulnerability | Insufficient input validation in the config builder of the Elastic search module could lead to remote code execution in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This vulnerability could be abused by an authenticated user with the ability to configure the catalog search. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7885'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:46:51Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-7hf3-h28p-q6gx | 2022-12-20T22:39:20Z | 2022-05-24T17:27:07Z | null | ['CVE-2020-2248'] | Reflected XSS vulnerability in Jenkins JSGames Plugin | Jenkins JSGames Plugin 0.2 and earlier evaluates part of a URL as code, resulting in a reflected cross-site scripting (XSS) vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jsgames'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2248'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jsgames-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1905'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:39:20Z', 'nvd_published_at': '2020-09-01T14:15:00Z'} |
1.4.0 | GHSA-fj32-6v7m-57pg | 2022-06-27T14:25:21Z | 2022-05-13T01:14:26Z | null | ['CVE-2019-7611'] | Improper Access Control in Elasticsearch | A permission issue was found in Elasticsearch versions before 5.6.15 and 6.6.1 when Field Level Security and Document Level Security are disabled and the _aliases, _shrink, or _split endpoints are used . If the elasticsearch.yml file has xpack.security.dls_fls.enabled set to false, certain permission checks are skipped... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7611'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077'}, {'type': 'PACKAGE', 'url': 'https://github.com/elastic/elasticsearch'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/s... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T14:25:21Z', 'nvd_published_at': '2019-03-25T19:29:00Z'} |
1.4.0 | GHSA-39mj-fpg2-3jrg | 2023-08-07T20:56:50Z | 2022-05-24T17:44:46Z | 2023-08-07T20:56:50Z | ['CVE-2021-28667'] | StackStorm st2 Infinite Loop Condition | StackStorm before 3.4.1, in some situations, has an infinite loop that consumes all available memory and disk space. This can occur if Python 3.x is used, the locale is not utf-8, and there is an attempt to log Unicode data (from an action or rule name). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'st2client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28667'}, {'type': 'PACKAGE', 'url': 'https://github.com/StackStorm/st2'}, {'type': 'WEB', 'url': 'https://stackstorm.com/2021/03/10/stackstorm-v3-4-1-security-fix/'}] | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T22:59:05Z', 'nvd_published_at': '2021-03-18T03:15:00Z'} |
1.4.0 | GHSA-hf4p-mhc8-x2gp | 2022-11-22T18:47:55Z | 2022-05-14T01:09:51Z | null | ['CVE-2017-5657'] | Apache Archiva vulnerable to Cross Site Request Forgery | Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5657'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/archiva'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:47:55Z', 'nvd_published_at': '2017-05-22T18:29:00Z'} |
1.4.0 | GHSA-wqv4-9gr3-3qgh | 2022-07-01T21:57:02Z | 2022-05-14T01:04:35Z | null | ['CVE-2017-1000395'] | Exposure of Sensitive Information to an Unauthorized Actor in Jenkins | Jenkins 2.73.1 and earlier, 2.83 and earlier provides information about Jenkins user accounts which is generally available to anyone with Overall/Read permissions via the /user/(username)/api remote API. This included e.g. Jenkins users' email addresses if the Mailer Plugin is installed. The remote API now no longer in... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.73.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.73.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000395'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/7b1f8e96a8d97dd09e5e093fcdb010b3295acc77'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advis... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:57:02Z', 'nvd_published_at': '2018-01-26T02:29:00Z'} |
1.4.0 | GHSA-5j9f-5wmp-7f8h | 2022-12-06T21:49:12Z | 2022-05-24T16:58:49Z | null | ['CVE-2019-10446'] | Jenkins Cadence vManager Plugin disables SSL/TLS and hostname verification | Jenkins Cadence vManager Plugin prior to version 2.7.1 disables SSL/TLS and hostname verification globally for the Jenkins master JVM. This issue is patched in 2.7.1 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vmanager-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10446'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/vmanager-plugin/commit/639aa135ab57d9e23c5bedeb0a5e9518eb0f486e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vmanager-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/... | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:49:12Z', 'nvd_published_at': '2019-10-16T14:15:00Z'} |
1.4.0 | GHSA-2xvx-rw9p-xgfc | 2022-12-02T21:10:55Z | 2022-05-18T00:00:39Z | null | ['CVE-2022-30945'] | Sandbox bypass vulnerability through implicitly allowlisted platform Groovy files in Jenkins Pipeline: Groovy Plugin | Pipeline: Groovy Plugin allows pipelines to load Groovy source files. This is intended to be used to allow Global Shared Libraries to execute without sandbox protection.
In Pipeline: Groovy Plugin 2689.v434009a_31b_f1 and earlier, any Groovy source files bundled with Jenkins core and plugins could be loaded this way a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2692.v76b'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2689.v434009a'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30945'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/workflow-cps-plugin/commit/76a7681702f42d65f77bbaa5463f146876ea62db'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/workflow-cps-plugin/commit/76b089ccd026b68012b0deb30c217395f7c... | {'cwe_ids': ['CWE-434', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:10:55Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-5qpp-v56f-mqfm | 2023-02-08T20:00:43Z | 2022-05-17T04:58:57Z | null | ['CVE-2013-4294'] | OpenStack Identity (Keystone) allows remote attackers to bypass intended access restrictions via revoked PKI token | The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2012.2.0'}, {'fixed': '2013.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4294'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:1285'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-4294'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/keystone/+bug/1202952'}, {'type': ... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T20:00:43Z', 'nvd_published_at': '2013-09-23T20:55:00Z'} |
1.4.0 | GHSA-fv4q-wm8c-wjg4 | 2023-09-26T19:52:42Z | 2022-05-24T17:02:40Z | null | ['CVE-2019-14909'] | Keycloak Authentication Error | A vulnerability was found in Keycloak 7.x where the user federation LDAP bind type is none (LDAP anonymous bind), any password, invalid or valid will be accepted. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'last_affected': '7.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14909'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2019-14909'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14909'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-287', 'CWE-305'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:03:15Z', 'nvd_published_at': '2019-12-04T15:15:00Z'} |
1.4.0 | GHSA-p7v9-gjrh-563x | 2023-07-20T23:32:15Z | 2022-05-13T01:14:06Z | null | ['CVE-2018-10891'] | Moodle XSS Vulnerability | A flaw was found in moodle before versions 3.5.1, 3.4.4, 3.3.7, 3.1.13. When a quiz question bank is imported, it was possible for the question preview that is displayed to execute JavaScript that is written into the question bank.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10891'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/0b18d0c960c27994dd9870d286f2da3fa5868c06'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10891'}, {'type': 'WEB', 'url': 'https://moodle.org/mo... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T23:32:15Z', 'nvd_published_at': '2018-07-10T18:29:00Z'} |
1.4.0 | GHSA-97rj-p794-wq6m | 2023-08-29T20:40:42Z | 2022-05-17T04:01:59Z | null | ['CVE-2012-5498'] | Plone denial of service via Caching Bypass | queryCatalog.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to bypass caching and cause a denial of service via a crafted request to a collection. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5498'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1194'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2012-5498'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=874665'}, {'type'... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T20:40:42Z', 'nvd_published_at': '2014-09-30T14:55:00Z'} |
1.4.0 | GHSA-4qvx-qq5w-695p | 2023-06-09T23:24:03Z | 2022-05-14T01:36:20Z | null | ['CVE-2018-19653'] | HashiCorp Consul can use cleartext agent-to-agent RPC communication | HashiCorp Consul 0.5.1 through 1.4.0 can use cleartext agent-to-agent RPC communication because the `verify_outgoing` setting is improperly documented. NOTE: the vendor has provided reconfiguration steps that do not require a software upgrade. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.1'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19653'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/5069'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/b64e8b262f80397eab4f39c6ae7e14683cb9f55c'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicor... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:24:03Z', 'nvd_published_at': '2018-12-09T19:29:00Z'} |
1.4.0 | GHSA-xjmj-p278-4jp5 | 2023-02-08T19:56:12Z | 2022-05-14T01:58:50Z | null | ['CVE-2014-3517'] | OpenStack Compute (Nova) Exposure of Sensitive Information to an Unauthorized Actor vulnerability | api/metadata/handler.py in OpenStack Compute (Nova) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2, when proxying metadata requests through Neutron, makes it easier for remote attackers to guess instance ID signatures via a brute-force attack that relies on timing differences in responses to instance m... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2013.2.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2014.0.0'}, {'fixed': '2014.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3517'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0940'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1084'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-3517'}, {'type': '... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T19:56:12Z', 'nvd_published_at': '2014-08-07T11:13:00Z'} |
1.4.0 | GHSA-7fjr-5hph-c2mh | 2022-11-01T22:43:48Z | 2022-05-13T01:31:35Z | null | ['CVE-2019-1003013'] | Cross-site Scripting in Jenkins Blue Ocean Plugin | A cross-site scripting vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier that allows attackers with permission to edit a user's description in Jenkins to have Blue Ocean render arbitrary HTML when using it as that user.
This vulnerability is found in:
- blueocean-commons/src/main/java/io/jenkins/blu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.blueocean:blueocean'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003013'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0326'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0327'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1204'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:43:48Z', 'nvd_published_at': '2019-02-06T16:29:00Z'} |
1.4.0 | GHSA-r2w2-h6r8-3r53 | 2023-01-24T15:55:07Z | 2022-05-24T19:18:05Z | null | ['CVE-2021-25971'] | Camaleon CMS vulnerable to Uncaught Exception | In Camaleon CMS, versions 2.0.1 through 2.6.0 are vulnerable to an Uncaught Exception. The app's media upload feature crashes permanently when an attacker with a low privileged access uploads a specially crafted .svg file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'camaleon_cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.1'}, {'fixed': '2.6.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25971'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/commit/ab89584ab32b98a0af3d711e3f508a1d048147d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/owen2345/camaleon-cms'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/... | {'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T15:55:07Z', 'nvd_published_at': '2021-10-20T12:15:00Z'} |
1.4.0 | GHSA-7ff8-qfwx-8gx5 | 2022-12-16T22:25:34Z | 2022-05-24T17:17:14Z | null | ['CVE-2020-2182'] | Improper masking of some secrets in Jenkins Credentials Binding Plugin | Credentials Binding Plugin allows specifying passwords and other secrets as environment variables, and will hide them from console output in builds. As a side effect of the fix for [SECURITY-698](https://www.jenkins.io/security/advisory/2018-02-05/#credentials-binding), `$` characters in secrets are escaped to `$$`. Th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials-binding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.22'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2182'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/credentials-binding-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-05-06/#SECURITY-1835'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:56:55Z', 'nvd_published_at': '2020-05-06T13:15:00Z'} |
1.4.0 | GHSA-42mm-x828-56c7 | 2022-12-13T18:55:05Z | 2022-05-24T17:43:00Z | null | ['CVE-2021-21617'] | CSRF vulnerability in Jenkins Configuration Slicing Plugin | Configuration Slicing Plugin 1.51 and earlier does not require POST requests for the form submission endpoint reconfiguring slices, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to apply different slice configurations to attacker-specified jobs.
Configuration Slic... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:configurationslicing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21617'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/configurationslicing-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2003'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T18:55:05Z', 'nvd_published_at': '2021-02-24T16:15:00Z'} |
1.4.0 | GHSA-77qc-gp37-hr26 | 2023-07-28T23:28:04Z | 2022-05-14T02:22:17Z | null | ['CVE-2016-7243'] | ChakraCore RCE Vulnerability | The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7243'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1982'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c2787ef8fdb7401922e9ec6540e4e5895d11c631'}, {'type': 'WEB', 'url': 'https://docs.microso... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T23:28:04Z', 'nvd_published_at': '2016-11-10T06:59:00Z'} |
1.4.0 | GHSA-hgq9-q8g2-3jmg | 2022-11-01T23:33:34Z | 2022-05-13T01:22:47Z | null | ['CVE-2019-6986'] | Command Injection in VIVO Vitro | SPARQL Injection in VIVO Vitro v1.10.0 allows a remote attacker to execute arbitrary SPARQL via the uri parameter, leading to a regular expression denial of service (ReDoS), as demonstrated by crafted use of FILTER%20regex in a /individual?uri= request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.vivoweb:vitro-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6986'}, {'type': 'WEB', 'url': 'https://github.com/vivo-project/Vitro/pull/111'}, {'type': 'WEB', 'url': 'https://github.com/vivo-project/Vitro/pull/111/commits/248ef19107a5ac6f86304fd8f3bc75f3787f8d49'}, {'type': 'WEB', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-400', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:33:34Z', 'nvd_published_at': '2019-01-28T15:29:00Z'} |
1.4.0 | GHSA-jjmc-4p83-pp26 | 2023-08-09T13:17:07Z | 2022-05-24T19:14:16Z | null | ['CVE-2021-40824'] | Logic error in Matrix SDK for Android | A logic error in the room key sharing functionality of Element Android before 1.2.2 and matrix-android-sdk2 (aka Matrix SDK for Android) before 1.2.2 leads to a situation where identity verification is inadequate and thus a key-requesting device can be impersonated. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.matrix.android:matrix-android-sdk2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40824'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-android-sdk2/releases/tag/v1.2.2'}, {'type': 'WEB', 'url': 'https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing'}] | {'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:17:07Z', 'nvd_published_at': '2021-09-13T19:15:00Z'} |
1.4.0 | GHSA-r5m2-g5gc-q43r | 2023-02-08T19:35:12Z | 2022-05-17T03:53:42Z | null | ['CVE-2014-3661'] | Jenkins Denial of Service vulnerability | Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to cause a denial of service (thread consumption) via vectors related to a CLI handshake. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.566'}, {'fixed': '1.583'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3661'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2014:1630'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0070'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-3661'}, {'type': '... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T19:35:12Z', 'nvd_published_at': '2014-10-16T19:55:00Z'} |
1.4.0 | GHSA-g784-q3p3-26rm | 2023-09-26T16:55:01Z | 2022-05-24T16:59:45Z | null | ['CVE-2019-17606'] | hexo-admin plugin for Node.js XSS Vulnerability | The Post editor functionality in the hexo-admin plugin versions 2.3.0 and earlier for Node.js is vulnerable to stored XSS via the content of a post. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'hexo-admin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17606'}, {'type': 'WEB', 'url': 'https://github.com/jaredly/hexo-admin/issues/185'}, {'type': 'WEB', 'url': 'https://github.com/418sec/hexo-admin/pull/2'}, {'type': 'WEB', 'url': 'https://github.com/jaredly/hexo-admin/pull/203'}, {'type': 'PACKAGE'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:38:56Z', 'nvd_published_at': '2019-10-23T17:15:00Z'} |
1.4.0 | GHSA-fcxw-hhxq-48wx | 2022-06-02T20:40:00Z | 2022-05-17T00:21:58Z | null | ['CVE-2017-1000242'] | Insecure temporary file usage in Jenkins Git Client Plugin | Jenkins Git Client Plugin 2.4.2 and earlier creates temporary file with insecure permissions resulting in information disclosure | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000242'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/git-client-plugin/commit/75ea3fe05650fc6ca09046a72493e2b3f066fb98'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-client-plugin'}, {'type': 'WEB', 'url': 'https://jenki... | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:40:00Z', 'nvd_published_at': '2017-11-01T13:29:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.