schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-7gcp-2gmq-w3xh
2023-03-09T00:37:49Z
2022-05-13T01:38:25Z
null
['CVE-2017-0899']
RubyGems Code Injection vulnerability
RubyGems prior to 2.6.13 is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0899'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/1bcbc7fe637b03145401ec9c094066285934a7f1'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/ef0aa611effb5f54d40c7fba6e8235eb43c5a491'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-150', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T00:37:49Z', 'nvd_published_at': '2017-08-31T20:29:00Z'}
1.4.0
GHSA-qx76-c53f-5c7q
2022-09-12T15:59:43Z
2022-05-14T01:40:50Z
null
['CVE-2018-20583']
PHP League CommonMark vulnerable to Cross-Site Scripting (XSS)
Cross-site scripting (XSS) vulnerability in the PHP League CommonMark library versions 0.15.6 through 0.18.x before 0.18.1 allows remote attackers to insert unsafe URLs into HTML (even if allow_unsafe_links is false) via a newline character (e.g., writing javascript as javascri%0apt).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'league/commonmark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.6'}, {'fixed': '0.18.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20583'}, {'type': 'WEB', 'url': 'https://github.com/thephpleague/commonmark/issues/337'}, {'type': 'WEB', 'url': 'https://commonmark.thephpleague.com/changelog/'}, {'type': 'PACKAGE', 'url': 'https://github.com/thephpleague/commonmark'}, {'type': '...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T15:59:43Z', 'nvd_published_at': '2018-12-30T05:29:00Z'}
1.4.0
GHSA-v5p2-vg3c-pmrr
2023-09-22T21:08:02Z
2022-05-01T18:33:34Z
null
['CVE-2007-5461']
Apache Tomcat Path Traversal Vulnerability
Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'last_affected': '4.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5461'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/37243'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'typ...
{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:08:02Z', 'nvd_published_at': '2007-10-15T18:17:00Z'}
1.4.0
GHSA-7388-7vq2-m4f4
2023-08-03T19:39:57Z
2022-05-24T17:44:52Z
null
['CVE-2021-28145']
Concrete CMS Cross-site Scripting via Survey Blocks
Concrete CMS (formerly concrete5) before 8.5.5 allows remote authenticated users to conduct Cross-site Scripting (XSS) attacks via a crafted survey block. This requires at least Editor privileges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28145'}, {'type': 'WEB', 'url': 'https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes'}, {'type': 'WEB', 'url': 'https://github.com/S1lkys/CVE-2021-40101'}, {'type': 'WEB', 'url': 'https://www.concrete5.org/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T22:52:02Z', 'nvd_published_at': '2021-03-18T16:15:00Z'}
1.4.0
GHSA-mwh9-gr45-xvv4
2023-09-25T19:47:00Z
2022-05-24T16:55:15Z
null
['CVE-2019-15630']
Mule modules contain Directory Traversal
Directory Traversal in APIkit, http-connector, and OAuth2 Provider modules in Mulesoft 3.x, 4.x and Mulesoft API Gateway (all versions) released before August 1, 2019 allow remote attackers to read files accessible to the Mule process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mule.runtime:mule'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'last_affected': '4.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15630'}, {'type': 'PACKAGE', 'url': 'https://github.com/mulesoft/mule'}, {'type': 'WEB', 'url': 'https://help.mulesoft.com/s/article/Directory-traversal-vulnerability-affecting-runtimes-of-MuleSoft-customers-running-certain-use-cases-of-Mule-flows-...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:35:58Z', 'nvd_published_at': '2019-08-30T17:15:00Z'}
1.4.0
GHSA-3747-gjc9-vvg6
2023-08-29T18:13:58Z
2022-05-17T04:19:03Z
null
['CVE-2013-6919']
phpThumb is vulnerable to Server-Side Request Forgery (SSRF)
The default configuration of phpThumb before 1.7.12 has a false value for the disable_debug option, which allows remote attackers to conduct Server-Side Request Forgery (SSRF) attacks via the src parameter.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'james-heinrich/phpthumb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6919'}, {'type': 'WEB', 'url': 'https://github.com/JamesHeinrich/phpThumb/commit/457a37d4a22ac9cdbbfe19577376622e58df81b0'}, {'type': 'PACKAGE', 'url': 'https://github.com/JamesHeinrich/phpThumb'}, {'type': 'WEB', 'url': 'https://github.com/JamesHe...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:13:58Z', 'nvd_published_at': '2014-12-27T18:59:00Z'}
1.4.0
GHSA-wp2f-hrg2-3r5m
2022-07-01T19:32:51Z
2022-05-14T00:58:02Z
null
['CVE-2017-15691']
Improper Restriction of XML External Entity Reference in Apache uimaj
In Apache uimaj prior to 2.10.2, Apache uimaj 3.0.0-xxx prior to 3.0.0-beta, Apache uima-as prior to 2.10.2, Apache uimaFIT prior to 2.4.0, Apache uimaDUCC prior to 2.2.2, this vulnerability relates to an XML external entity expansion (XXE) capability of various XML parsers. UIMA as part of its configuration and operat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.uima:uimafit-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.uima:uimaj-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15691'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1545'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/00407c65738e625a8cc9d732923a4ab2d8299603cc7c7e5cc2da9c79@%3Ccommits.uima.apache.org%3E'}, {'type': 'WEB...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T19:32:51Z', 'nvd_published_at': '2018-04-26T17:29:00Z'}
1.4.0
GHSA-xcvr-qv8h-m7xw
2022-10-25T17:35:35Z
2022-05-13T01:07:06Z
null
['CVE-2018-0875']
.NET Core Denial of Service Vulnerability
.NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka ".NET Core Denial of Service Vulnerability".
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.Jit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.Jit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.7'}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0875'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/62'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0522'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/adviso...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T17:35:35Z', 'nvd_published_at': '2018-03-14T17:29:00Z'}
1.4.0
GHSA-92j2-gg59-4572
2023-07-31T19:12:01Z
2022-05-14T02:23:12Z
null
['CVE-2016-3382']
ChakraCore RCE Vulnerability
The scripting engines in Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, as demonstrated by the Chakra JavaScript engine, aka "Scripting Engine Memory Corruption Vulnerability."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3382'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1737'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f05c42e64c3b2d057ae1a52fe1917af26c9f2737'}, {'type': 'WEB', 'url': 'https://docs.microso...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:12:01Z', 'nvd_published_at': '2016-10-14T02:59:00Z'}
1.4.0
GHSA-q397-w28f-jx97
2022-12-20T22:41:34Z
2022-05-24T17:19:04Z
null
['CVE-2020-2194']
Stored XSS vulnerability in Jenkins ECharts API Plugin
ECharts API Plugin 4.7.0-3 and earlier does not escape the display name of the builds in the trend chart. This results in a stored cross-site scripting (XSS) vulnerability that can be exploited by users with Run/Update permission. ECharts API Plugin 4.7.0-4 escapes the display name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:echarts-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.0-4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2194'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/echarts-api-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1842'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:41:34Z', 'nvd_published_at': '2020-06-03T13:15:00Z'}
1.4.0
GHSA-44pw-h2cw-w3vq
2022-05-23T20:18:14Z
2022-05-23T20:18:14Z
null
['CVE-2022-29167']
Uncontrolled Resource Consumption in Hawk
Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hawk'}, 'ecosystem_specific': {'affected_functions': ['hawk.utils.parseHost']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mozilla/hawk/security/advisories/GHSA-44pw-h2cw-w3vq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29167'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/hawk/pull/286'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/hawk/commit/d10d72ca8...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-23T20:18:14Z', 'nvd_published_at': '2022-05-05T23:15:00Z'}
1.4.0
GHSA-wqjj-hx84-v449
2023-09-05T13:57:24Z
2022-05-17T03:07:04Z
null
['CVE-2014-0474']
Django Vulnerable to MySQL Injection
The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to "MySQL typec...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.6'}]}]}, {'package': {'ecosystem': 'PyP...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0474'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/5f0829a27e85d89ad8c433f5c6a7a7d17c9e9292'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/985434fb1d6bf2335bf96c6ebf91c3674f1f399f'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:58:21Z', 'nvd_published_at': '2014-04-23T15:55:00Z'}
1.4.0
GHSA-ww6f-76ff-phhj
2023-07-31T20:29:04Z
2022-05-14T02:24:35Z
null
['CVE-2016-3202']
ChakraCore RCE Vulnerability
The Microsoft (1) Chakra JavaScript, (2) JScript, and (3) VBScript engines, as used in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3202'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/ff9067ebe9e1c92eff4e25da95070bfd5942da07'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-063'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T20:29:04Z', 'nvd_published_at': '2016-06-16T01:59:00Z'}
1.4.0
GHSA-pwr7-j6g3-hmx6
2023-07-27T00:15:21Z
2022-05-17T00:11:38Z
null
['CVE-2017-17431']
GeniXCMS XSS Vulnerability
GeniXCMS 1.1.5 has XSS via the from, id, lang, menuid, mod, q, status, term, to, or token parameter. NOTE: this might overlap CVE-2017-14761, CVE-2017-14762, or CVE-2017-14765.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'genix/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17431'}, {'type': 'WEB', 'url': 'https://code610.blogspot.com/2017/12/modus-operandi-genixcms-115.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T00:15:21Z', 'nvd_published_at': '2017-12-05T21:29:00Z'}
1.4.0
GHSA-gv85-wgxc-vc56
2023-08-03T22:44:43Z
2022-05-14T00:57:47Z
null
['CVE-2016-10321']
web2py is vulnerable to password brute-force attack
web2py before 2.14.6 does not properly check if a host is denied before verifying passwords, allowing a remote attacker to perform brute-force attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'web2py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10321'}, {'type': 'WEB', 'url': 'https://github.com/web2py/web2py/issues/1585#issuecomment-284317919'}, {'type': 'WEB', 'url': 'https://github.com/web2py/web2py/commit/944d8bd8f3c5cf8ae296fc03d149056c65358426'}, {'type': 'PACKAGE', 'url': 'https://...
{'cwe_ids': ['CWE-307'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:44:43Z', 'nvd_published_at': '2017-04-10T14:59:00Z'}
1.4.0
GHSA-x9fv-c87w-55wc
2022-07-08T19:19:37Z
2022-05-13T01:26:34Z
null
['CVE-2013-4330']
Improper Control of Generation of Code in Apache Camel
Apache Camel before 2.9.7, 2.10.0 before 2.10.7, 2.11.0 before 2.11.2, and 2.12.0 allows remote attackers to execute arbitrary simple language expressions by including "$simple{}" in a CamelFileName message header to a (1) FILE or (2) FTP producer.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4330'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87542'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E'}, ...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:19:37Z', 'nvd_published_at': '2013-10-04T17:55:00Z'}
1.4.0
GHSA-2pqc-gv8q-pvqv
2023-08-03T19:53:31Z
2022-05-17T01:57:52Z
null
['CVE-2015-5081']
django-cms CSRF Vulnerability
Cross-site request forgery (CSRF) vulnerability in django CMS before 3.0.14, 3.1.x before 3.1.1 allows remote attackers to manipulate privileged users into performing unknown actions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5081'}, {'type': 'WEB', 'url': 'https://github.com/django-cms/django-cms/commit/f77cbc607d6e2a62e63287d37ad320109a2cc78a'}, {'type': 'WEB', 'url': 'https://www.django-cms.org/en/blog/2015/06/27/311-3014-release/'}, {'type': 'WEB', 'url': 'http://ww...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T19:53:31Z', 'nvd_published_at': '2017-08-18T18:29:00Z'}
1.4.0
GHSA-985w-mqqp-7287
2023-09-26T19:07:28Z
2022-05-24T17:00:25Z
null
['CVE-2019-8120']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. An authenticated user can inject arbitrary Javascript code by manipulating section of a POST request related to customer's email address.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8120'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T17:47:56Z', 'nvd_published_at': '2019-11-05T23:15:00Z'}
1.4.0
GHSA-p97q-j98q-f98w
2023-07-21T22:14:13Z
2022-05-13T01:20:45Z
null
['CVE-2018-8287']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-8242, CVE-2018-82...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8287'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5444'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/fa89a7031e75ca8b4a595765e897e8fc0d9fae76'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:14:13Z', 'nvd_published_at': '2018-07-11T00:29:00Z'}
1.4.0
GHSA-8f4c-h6m3-22rw
2023-07-21T19:25:19Z
2022-05-13T01:21:01Z
null
['CVE-2018-8588']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8588'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5827'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c76da44c27fcf06ad5ac3ee6f8d45efb8d8bc04f'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:25:19Z', 'nvd_published_at': '2018-11-14T01:29:00Z'}
1.4.0
GHSA-ww7r-278h-48mh
2023-07-20T13:09:39Z
2022-05-24T17:36:17Z
null
['CVE-2020-20136']
QuantConnect Lean vulnerable to insecure deserialization
QuantConnect Lean versions from 2.3.0.0 to 2.4.0.1 are affected by an insecure deserialization vulnerability due to insecure configuration of TypeNameHandling property in Json.NET library. One may avoid this issue by only running Lean in an environment where data provided is trusted.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'QuantConnect.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0.0'}, {'last_affected': '2.4.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20136'}, {'type': 'WEB', 'url': 'https://github.com/QuantConnect/Lean/issues/3537'}, {'type': 'PACKAGE', 'url': 'https://github.com/QuantConnect/Lean'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T13:09:39Z', 'nvd_published_at': '2020-12-14T19:15:00Z'}
1.4.0
GHSA-4749-p7rx-8jjj
2023-08-02T20:59:34Z
2022-05-14T03:07:28Z
null
['CVE-2015-3220']
tlslite remote denial of service vulnerability
The tlslite library before 0.4.9 for Python allows remote attackers to trigger a denial of service (runtime exception and process crash).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tlslite'}, 'ecosystem_specific': {'affected_functions': ['tlslite.tlsrecordlayer.TLSRecordLayer._decryptRecord']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3220'}, {'type': 'WEB', 'url': 'https://github.com/trevp/tlslite/commit/aca8d4f898b436ff6754e1a9ab96cae976c8a853'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1254215'}, {'type': 'WEB', 'url': 'https://groups.google.com/for...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T20:59:14Z', 'nvd_published_at': '2017-06-13T16:29:00Z'}
1.4.0
GHSA-fw42-4mq4-4qpq
2023-07-21T20:26:56Z
2022-05-13T01:20:55Z
null
['CVE-2018-8500']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8500'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5764'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cd84a0b85b4b2bcf1653c7bfd5426bbc72b2b216'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:26:56Z', 'nvd_published_at': '2018-10-10T13:29:00Z'}
1.4.0
GHSA-h892-x453-86wc
2023-07-20T23:22:46Z
2022-05-13T01:19:33Z
null
['CVE-2018-18240']
Pippo RCE Vulnerability
Pippo through 1.11.0 allows remote code execution via a command to java.lang.ProcessBuilder because the XstreamEngine component does not use XStream's available protection mechanisms to restrict unmarshalling.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'ro.pippo:pippo-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18240'}, {'type': 'WEB', 'url': 'https://github.com/pippo-java/pippo/issues/454'}, {'type': 'WEB', 'url': 'https://github.com/pippo-java/pippo/commit/c6b26551a82d2dd32097fcb17c13c3b830916296'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T23:22:46Z', 'nvd_published_at': '2018-10-11T07:29:00Z'}
1.4.0
GHSA-c445-xm3f-hmfh
2022-12-29T01:35:38Z
2022-05-24T17:28:25Z
null
['CVE-2020-2258']
Incorrect permission check in Health Advisor by CloudBees Plugin
Health Advisor by CloudBees Plugin 3.2.0 and earlier does not correctly perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to view an administrative configuration page. Health Advisor by CloudBees Plugin 3.2.1 requires Overall/Administer to view its administrative confi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-jenkins-advisor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2258'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cloudbees-jenkins-advisor-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1998'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists...
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:35:38Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-fg4r-f9j2-36mw
2023-02-08T17:54:38Z
2022-05-17T03:51:00Z
null
['CVE-2013-2034']
Jenkins Cross-Site Request Forgery vulnerabilities
Multiple cross-site request forgery (CSRF) vulnerabilities in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code or (2) initiate deployment of b...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.509.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.513'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2034'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2013:1032'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-2034'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=958958'}, {'type'...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:54:38Z', 'nvd_published_at': '2014-05-14T19:55:00Z'}
1.4.0
GHSA-68g5-8q7f-m384
2022-06-30T21:21:47Z
2022-05-14T00:58:29Z
null
['CVE-2017-7675']
Improper Limitation of a Pathname to a Restricted Directory in Apache Tomcat
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M21'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7675'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/cf181edc9a8c239cde704cffc3c503425bdcae2b'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/dacb030b85fe0e0b3da87469e23d0f31252fdede'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T21:21:47Z', 'nvd_published_at': '2017-08-11T02:29:00Z'}
1.4.0
GHSA-q263-j3q9-g964
2023-07-31T22:23:29Z
2022-05-13T01:24:45Z
null
['CVE-2017-1000119']
October CMS PHP Code Execution
October CMS build 412 is vulnerable to PHP code execution in the file upload functionality resulting in site compromise and possibly other applications on the server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.412'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000119'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}, {'type': 'WEB', 'url': 'http://octobercms.com/support/article/rn-8'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154390/October-CMS-Upload-Protection-...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:23:29Z', 'nvd_published_at': '2017-10-05T01:29:00Z'}
1.4.0
GHSA-gw85-4gmf-m7rh
2022-07-13T17:20:15Z
2022-05-17T05:39:03Z
null
['CVE-2011-1498']
Exposure of Sensitive Information to an Unauthorized Actor in Apache HttpClient
Apache HttpClient 4.x before 4.1.1 in Apache HttpComponents, when used with an authenticating proxy server, sends the Proxy-Authorization header to the origin server, which allows remote web servers to obtain sensitive information by logging this header.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1498'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=709531'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/HTTPCLIENT-1061'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:20:15Z', 'nvd_published_at': '2011-07-07T21:55:00Z'}
1.4.0
GHSA-372q-33vh-8mpc
2022-11-03T18:47:34Z
2022-05-14T01:10:15Z
null
['CVE-2017-15706']
Inconsistent documentation in Apache Tomcat
As part of the fix for bug 61201, the documentation for Apache Tomcat 9.0.0.M22 to 9.0.1, 8.5.16 to 8.5.23, 8.0.45 to 8.0.47 and 7.0.79 to 7.0.82 included an updated description of the search algorithm used by the CGI Servlet to identify which script to execute. The update was not correct. As a result, some scripts may...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M22'}, {'fixed': '9.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.16'}, {'fixed'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15706'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8...
{'cwe_ids': ['CWE-1068'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:47:34Z', 'nvd_published_at': '2018-01-31T14:29:00Z'}
1.4.0
GHSA-qv62-xfj6-32xm
2023-05-04T21:14:40Z
2022-05-17T00:16:50Z
null
['CVE-2015-4020']
RubyGems Improper Input Validation vulnerability
RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.3.x before 2.4.8 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0.rc.1'}, {'fixed': '2.2.5'}]}]},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4020'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/5c7bfb5'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubygems/rubygems'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-04T21:14:40Z', 'nvd_published_at': '2015-08-25T17:59:00Z'}
1.4.0
GHSA-fp6p-5xvw-m74f
2023-07-31T22:16:33Z
2022-05-17T01:09:58Z
null
['CVE-2016-2513']
Django User Enumeration Vulnerability
The password hasher in `contrib/auth/hashers.py` in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2513'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160322001143/http://www.securitytracker.com/id/1035152'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:16:33Z', 'nvd_published_at': '2016-04-08T15:59:00Z'}
1.4.0
GHSA-2w4x-rxp7-grg7
2022-06-30T17:37:29Z
2022-05-13T01:01:02Z
null
['CVE-2018-1000192']
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
A information exposure vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in AboutJenkins.java, ListPluginsCommand.java that allows users with Overall/Read access to enumerate all installed plugins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.107.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.107.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000192'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/7c5b41bfd5d8004f82684a9168dd627e20ea5f35'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/809916b59b7c7678dc3c1c76338452121fed1424'}, {'type': 'PAC...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T17:37:29Z', 'nvd_published_at': '2018-06-05T21:29:00Z'}
1.4.0
GHSA-x6jw-2f23-mc5j
2022-06-30T19:40:26Z
2022-05-13T01:01:02Z
null
['CVE-2018-1000068']
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenkins home directory is on a case-insensitive file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.89.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.89.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000068'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/8830d68f5fe21f344be3496984bc4470bfcd0564'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advis...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T19:40:26Z', 'nvd_published_at': '2018-02-16T00:29:00Z'}
1.4.0
GHSA-95m2-p98f-24r5
2022-11-08T14:32:31Z
2022-05-14T03:35:52Z
null
['CVE-2017-15693']
Apache Geode unsafe deserialization of application objects
In Apache Geode before v1.4.0, the Geode server stores application objects in serialized form. Certain cluster operations and API invocations cause these objects to be deserialized. A user with DATA:WRITE access to the cluster may be able to cause remote code execution if certain classes are present on the classpath.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15693'}, {'type': 'WEB', 'url': 'https://github.com/apache/geode/pull/1166'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/GEODE-3923'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cc3ec1d06062f54fdaa0357874c1d148f...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:32:31Z', 'nvd_published_at': '2018-02-27T15:29:00Z'}
1.4.0
GHSA-p258-xmh3-72pv
2023-02-08T18:04:25Z
2022-05-17T04:41:34Z
null
['CVE-2014-0167']
OpenStack Compute (Nova) allows remote authenticated users to gain privileges via API requests
The Nova EC2 API security group implementation in OpenStack Compute (Nova) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 does not enforce RBAC policies for (1) add_rules, (2) remove_rules, (3) destroy, and other unspecified methods in compute/api.py when using non-default policies, which allows remote authent...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2013.1.0'}, {'fixed': '2013.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0167'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1084'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-0167'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1084868'}, {'type...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:04:25Z', 'nvd_published_at': '2014-04-15T14:55:00Z'}
1.4.0
GHSA-6xhj-p29v-82j8
2022-11-22T19:25:07Z
2022-05-13T01:53:29Z
null
['CVE-2018-8028']
Apache Sentry may allow attacker to access/remove data from Sentry protected table
An authenticated user can execute ALTER TABLE EXCHANGE PARTITIONS without being authorized by Apache Sentry before 2.0.1. This can allow an attacker unauthorized access to the partitioned data of a Sentry protected table and can allow an attacker to remove data from a Sentry protected table.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sentry:sentry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8028'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/SENTRY/Vulnerabilities+found+in+Apache+Sentry'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/sentry'}]
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:25:07Z', 'nvd_published_at': '2018-08-23T15:29:00Z'}
1.4.0
GHSA-qwm8-vgm6-f86p
2022-06-01T19:47:27Z
2022-05-13T01:15:06Z
null
['CVE-2019-1003032']
Script security sandbox bypass in Jenkins Email Extension Plugin
A sandbox bypass vulnerability exists in Jenkins Email Extension Plugin 2.64 and earlier in pom.xml, src/main/java/hudson/plugins/emailext/ExtendedEmailPublisher.java, src/main/java/hudson/plugins/emailext/plugins/content/EmailExtScript.java, src/main/java/hudson/plugins/emailext/plugins/content/ScriptContent.java, src...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.65'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003032'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/email-ext-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1340'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107476'}]
{'cwe_ids': ['CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:47:27Z', 'nvd_published_at': '2019-03-08T21:29:00Z'}
1.4.0
GHSA-mrr8-fcg7-p2wg
2022-12-20T21:28:10Z
2022-05-24T17:25:24Z
null
['CVE-2020-2234']
Missing permission check in Jenkins Pipeline Maven Integration Plugin allow capturing credentials
Pipeline Maven Integration Plugin 3.8.2 and earlier does not perform a permission check in a method implementing form validation. This allows users with Overall/Read access to Jenkins to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capt...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-maven'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2234'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-maven-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1794%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T21:28:10Z', 'nvd_published_at': '2020-08-12T14:15:00Z'}
1.4.0
GHSA-g67x-mgrv-m3gv
2023-07-13T17:07:42Z
2022-05-24T17:10:58Z
null
['CVE-2020-0812']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based)L, aka Chakra Scripting Engine Memory Corruption Vulnerability. This CVE ID is unique from CVE-2020-0811.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0812'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6385'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6385/commits/bdd48f21a93bd9dc7dd5f783b58df8bef72583c4'}, {'type': 'PACKAGE', 'url': 'https...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:07:42Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}
1.4.0
GHSA-rqw2-hhrf-7936
2023-07-13T17:10:16Z
2022-05-24T17:17:23Z
null
['CVE-2020-12692']
OpenStack Keystone does not check signature TTL of the EC2 credential auth method
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 15.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12692'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/keystone/+bug/1872737'}, {'type': 'WEB', 'url': 'https://opendev.org/openstack/keystone/commit/ab89ea749013e7f2c46260f68504f5687763e019'}, {'type': 'WEB', 'url': 'https://security.openstac...
{'cwe_ids': ['CWE-311', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:10:16Z', 'nvd_published_at': '2020-05-07T00:15:00Z'}
1.4.0
GHSA-gp69-xcm6-ffqj
2023-08-04T21:55:11Z
2022-05-17T03:03:31Z
null
['CVE-2016-4808']
Web2py Cross-Site Request Forgery vulnerability
Web2py versions 2.14.5 and below was affected by CSRF (Cross Site Request Forgery) vulnerability, which allows an attacker to trick a logged-in administrator into performing unwanted actions i.e An attacker can trick a victim into disable the installed application just by visiting a URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'web2py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.14.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4808'}, {'type': 'PACKAGE', 'url': 'https://github.com/web2py/web2py'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/39821/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/137070/Web2py-2.14.5-CSRF-XSS-Local-File-Incl...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:55:11Z', 'nvd_published_at': '2017-01-11T16:59:00Z'}
1.4.0
GHSA-2w26-gmqm-mc5p
2023-09-25T18:57:41Z
2022-05-24T16:52:22Z
null
['CVE-2019-7855']
Magento 2 Community Cryptographic Flaw
A cryptograhic flaw in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 could be abused by an unauthenticated user to discover an invariant used in gift card generation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7855'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}]
{'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:19:49Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-m2r2-qc49-gqw4
2023-07-25T20:02:22Z
2022-05-14T03:25:24Z
null
['CVE-2018-7035']
Gleez CMS Stored XSS
Cross-site scripting (XSS) vulnerability in Gleez CMS 1.2.0 and 2.0 might allow remote attackers (users) to inject JavaScript via HTML content in an editor, which will result in Stored XSS when an Administrator tries to edit the same content, as demonstrated by use of the source editor for HTML mode in an Add Blog acti...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'gleez/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'gleez/cms'}, 'ecosystem_specific': {'affected_functions': [''...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7035'}, {'type': 'WEB', 'url': 'https://github.com/gleez/cms/issues/794'}, {'type': 'WEB', 'url': 'https://github.com/gleez/cms/issues/796'}, {'type': 'WEB', 'url': 'https://github.com/gleez/cms/commit/d4ad1844e9fe6e2b9b92dfb351fb7e01047f9565'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T20:02:22Z', 'nvd_published_at': '2018-04-05T14:29:00Z'}
1.4.0
GHSA-gvc8-xjfp-6569
2023-08-01T19:50:39Z
2022-05-13T01:13:58Z
null
['CVE-2015-8606']
Silverstripe CMS XSS Vulnerability
Multiple cross-site scripting (XSS) vulnerabilities in SilverStripe CMS & Framework before 3.1.16 and 3.2.0 before 3.2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) Locale or (2) FailedLoginCount parameter to `admin/security/EditForm/field/Members/item/new/ItemEditForm`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.15'}}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8606'}, {'type': 'WEB', 'url': 'https://cybersecurityworks.com/zerodays/cve-2015-8606-silverstripe.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2015/Dec/55'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:50:39Z', 'nvd_published_at': '2016-04-13T15:59:00Z'}
1.4.0
GHSA-ff4w-8chr-w2x9
2023-08-25T21:15:54Z
2022-05-24T16:44:03Z
null
['CVE-2019-11401']
SiteServer CMS RCE via unsafe file upload
A issue was discovered in SiteServer CMS prior to version 6.12. It allows remote attackers to execute arbitrary code because an administrator can add the permitted file extension `.aassp`, which is converted to `.asp` because the "as" substring is deleted.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'sscms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11401'}, {'type': 'WEB', 'url': 'https://github.com/siteserver/cms/issues/1858'}, {'type': 'WEB', 'url': 'https://github.com/siteserver/cms/commit/a7edb9ce3f9b52be3d18fa8a0e44931264e22436#diff-c8a06aaffb97eb2f4c587c1786906edd49dea574d063f74a59d9653...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T20:14:41Z', 'nvd_published_at': '2019-04-22T11:29:00Z'}
1.4.0
GHSA-2x2q-2xpv-mcf9
2023-09-26T19:10:43Z
2022-05-24T17:00:25Z
null
['CVE-2019-8127']
Magento 2 Community Edition SQLi Vulnerability
A SQL injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with privileges to an account with Newsletter Template editing permission could exfiltrate the Admin login data, and reset their password, effectively performing a privilege escalation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8127'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T17:58:21Z', 'nvd_published_at': '2019-11-05T23:15:00Z'}
1.4.0
GHSA-77xq-7c6p-6xp6
2023-08-28T23:21:08Z
2022-05-05T00:29:09Z
null
['CVE-2013-2095']
RubyGem openshift-origin-controller is vulnerable to command injection
rubygem-openshift-origin-controller: API can be used to create applications via cartridge_cache.rb URI.prase() to perform command injection
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'openshift-origin-controller'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2095'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2013-2095'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2095'}, {'type': 'PACKAGE', 'url': 'https://github.com/openshift/origin-server'}, {...
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:21:08Z', 'nvd_published_at': '2019-12-10T14:15:00Z'}
1.4.0
GHSA-qf3f-7x69-qfv3
2023-07-31T18:48:27Z
2022-05-14T03:14:46Z
null
['CVE-2016-6622']
phpMyAdmin DoS Vulnerability
An issue was discovered in phpMyAdmin. An unauthenticated user is able to execute a denial-of-service (DoS) attack by forcing persistent connections when phpMyAdmin is running with `$cfg['AllowArbitraryServer']=true`. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4'}, {'fixed': '4.4....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6622'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210125183746/http://ww...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:48:27Z', 'nvd_published_at': '2016-12-11T02:59:00Z'}
1.4.0
GHSA-38hf-xjmx-jrh8
2022-11-04T22:46:06Z
2022-05-14T02:59:36Z
null
['CVE-2018-14380']
Cross-site Scripting in Graylog Server
In Graylog before 2.4.6, XSS was possible in typeahead components, related to components/common/TypeAheadInput.jsx and components/search/QueryInput.ts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.graylog2:graylog2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14380'}, {'type': 'WEB', 'url': 'https://github.com/Graylog2/graylog2-server/pull/4904'}, {'type': 'PACKAGE', 'url': 'https://github.com/Graylog2/graylog2-server'}, {'type': 'WEB', 'url': 'https://www.graylog.org/post/announcing-the-release-of-gray...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T22:46:06Z', 'nvd_published_at': '2018-07-18T15:29:00Z'}
1.4.0
GHSA-pj45-8vhc-mh2f
2022-11-22T19:38:17Z
2022-05-14T03:45:42Z
null
['CVE-2017-1000402']
Jenkins Swarm Plugin Client vulnerable to man-in-the-middle attacks
Jenkins Swarm Plugin Client 3.4 and earlier bundled a version of the commons-httpclient library with the vulnerability CVE-2012-6153 that incorrectly verified SSL certificates, making it susceptible to man-in-the-middle attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:swarm-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:swarm-plug...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000402'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-10-11/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:38:17Z', 'nvd_published_at': '2018-01-26T02:29:00Z'}
1.4.0
GHSA-f4gq-7hvf-fjm3
2022-12-22T14:04:17Z
2022-05-24T17:12:40Z
null
['CVE-2020-2170']
Stored XSS vulnerability in Jenkins RapidDeploy Plugin
RapidDeploy Plugin 4.2 and earlier does not escape package names in its displayed table of packages obtained from a remote server. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to configure jobs. RapidDeploy Plugin 4.2.1 escapes package names.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rapiddeploy-jenkins'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2170'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rapiddeploy-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1676'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T14:04:17Z', 'nvd_published_at': '2020-03-25T17:15:00Z'}
1.4.0
GHSA-56hf-w8gm-448q
2023-09-26T17:48:33Z
2022-05-24T17:00:24Z
null
['CVE-2019-8092']
Magento 2 Community Edition XSS Vulnerability
A reflected cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code via email template preview.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8092'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:13:35Z', 'nvd_published_at': '2019-11-05T23:15:00Z'}
1.4.0
GHSA-fqg2-c97r-rqcj
2022-11-03T23:19:45Z
2022-05-13T01:50:55Z
null
['CVE-2018-1999040']
Exposure of Sensitive Information in Jenkins Kubernetes Plugin
An exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.10.1 and earlier in KubernetesCloud.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.csanchez.jenkins.plugins:kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999040'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-30/#SECURITY-1016'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:19:45Z', 'nvd_published_at': '2018-08-01T13:29:00Z'}
1.4.0
GHSA-h5g4-ppwx-48q2
2022-05-24T22:06:50Z
2022-05-24T22:06:50Z
null
['CVE-2022-29194']
Missing validation causes denial of service via `DeleteSessionTensor`
### Impact The implementation of [`tf.raw_ops.DeleteSessionTensor`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/session_ops.cc#L128-L144) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denia...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h5g4-ppwx-48q2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29194'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/cff267650c6a1b266e4b4500f69fbc49cdd773c5'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:06:50Z', 'nvd_published_at': '2022-05-20T21:15:00Z'}
1.4.0
GHSA-3m99-h3hp-w9j7
2023-08-15T22:30:28Z
2022-05-13T01:12:40Z
null
['CVE-2014-3545']
Moodle remote code execution via quiz questions
Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote authenticated users to execute arbitrary code via a calculated question in a quiz.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1'}]}], 'versions': ['2.7.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3545'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/blob/1474f74687dda57c7d011b92d16f25b9870d2799/question/type/calculated/question.php#L426'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T22:30:28Z', 'nvd_published_at': '2014-07-29T11:10:00Z'}
1.4.0
GHSA-8x6c-375h-pm4f
2022-11-02T00:05:07Z
2022-05-24T16:58:49Z
null
['CVE-2019-10448']
Cleartext Storage of Sensitive Information in Jenkins Extensive Testing Plugin
Jenkins Extensive Testing Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'jenkins.xtc:extensivetesting'}, 'versions': ['1.4.4b']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10448'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1432'}]
{'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:05:07Z', 'nvd_published_at': '2019-10-16T14:15:00Z'}
1.4.0
GHSA-q586-7p8w-9pg8
2022-11-04T18:44:00Z
2022-05-17T01:17:12Z
null
['CVE-2017-3155']
Cross-site Scripting in Apache Atlas
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to cross frame scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:atlas-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1-incubating'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3155'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/atlas'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4a4fef91e067fd0d9da569e30867c1fa65e2a0520acde71ddefee0ea@%3Cdev.atlas.apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:44:00Z', 'nvd_published_at': '2017-08-29T20:29:00Z'}
1.4.0
GHSA-q326-jhw3-699g
2022-07-06T20:15:42Z
2022-05-17T00:36:05Z
null
['CVE-2015-4706']
Improper Neutralization of Input During Web Page Generation in IPython
Cross-site scripting (XSS) vulnerability in IPython 3.x before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/contents path.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4706'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/7222bd53ad089a65fd610fab4626f9d0ab47dfce'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/c2078a53543ed502efd968649fee1125e0eb549c'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:15:42Z', 'nvd_published_at': '2017-09-21T14:29:00Z'}
1.4.0
GHSA-579v-mp3v-rrw5
2022-09-12T14:46:34Z
2022-05-14T01:09:51Z
null
['CVE-2011-4969']
jQuery vulnerable to Cross-Site Scripting (XSS)
Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-4969'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/commit/db9e023e62c1ff5d8f21ed9868ab6878da2005e9'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T14:46:34Z', 'nvd_published_at': '2013-03-08T22:55:00Z'}
1.4.0
GHSA-5j48-826p-2w9r
2023-07-20T18:25:58Z
2022-05-13T01:18:32Z
null
['CVE-2018-0834']
ChakraCore RCE Vulnerability
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0835, CVE-2018-0836, CVE-2018-0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0834'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6cd503299eac4a5b5ffc0c5bb0d072861f60e183'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0834'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:25:58Z', 'nvd_published_at': '2018-02-15T02:29:00Z'}
1.4.0
GHSA-f24j-f97w-65h8
2023-07-20T00:07:10Z
2022-05-24T16:57:58Z
null
['CVE-2018-21025']
Centreon Privilege Escalation
In Centreon VM through 19.04.3, centreon-backup.pl allows attackers to become root via a crafted script, due to incorrect rights of sourced configuration files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '19.04.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21025'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/issues/7082'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2019/10/08/1'}]
{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T00:07:10Z', 'nvd_published_at': '2019-10-08T13:15:00Z'}
1.4.0
GHSA-p4xg-cpr9-vwvj
2023-07-28T21:38:39Z
2022-05-13T01:38:28Z
null
['CVE-2016-9589']
Red Hat Wildfly DoS
Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to "max-headers" (default 200) * "max-...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 11.0.0.Beta1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9589'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0872'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0873'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3454'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T21:38:39Z', 'nvd_published_at': '2018-03-12T15:29:00Z'}
1.4.0
GHSA-vq79-mgpx-2wx4
2023-07-31T22:21:37Z
2022-05-17T02:16:00Z
null
['CVE-2016-4431']
Apache Struts Access Control Redirect
Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks by leveraging a default method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts-master'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.20'}, {'last_affected': '2.3.28.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4431'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1348252'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-040.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123145002/http://www.securityfocus...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:21:37Z', 'nvd_published_at': '2016-07-04T22:59:00Z'}
1.4.0
GHSA-j556-q367-2gw6
2023-08-16T23:07:18Z
2022-05-17T03:56:49Z
null
['CVE-2014-6276']
Roundup sensitive data disclosure vulnerability
schema.py in Roundup before 1.5.1 does not properly limit attributes included in default user permissions, which might allow remote authenticated users to obtain sensitive user information by viewing user details.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'roundup'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6276'}, {'type': 'WEB', 'url': 'https://sourceforge.net/p/roundup/code/ci/tip/tree/CHANGES.txt'}, {'type': 'WEB', 'url': 'http://hg.code.sf.net/p/roundup/code/rev/a403c29ffaf9'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3502'...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:07:18Z', 'nvd_published_at': '2016-04-13T14:59:00Z'}
1.4.0
GHSA-rm7v-gqfg-p2wc
2022-07-07T22:38:37Z
2022-05-14T01:11:29Z
null
['CVE-2014-3603']
Improper Validation of Certificate with Host Mismatch in Shibboleth Identity Provider and OpenSAML Java
The (1) HttpResource and (2) FileBackedHttpResource implementations in Shibboleth Identity Provider (IdP) before 2.4.1 and OpenSAML Java 2.6.2 do not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'edu.internet2.middleware:shibboleth-identityprovider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opensaml:opensaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3603'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1131823'}, {'type': 'WEB', 'url': 'http://shibboleth.net/community/advisories/secadv_20140813.txt'}]
{'cwe_ids': ['CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:38:37Z', 'nvd_published_at': '2019-04-04T14:29:00Z'}
1.4.0
GHSA-v38p-mqq3-m6v5
2023-07-26T19:14:49Z
2022-05-13T01:38:14Z
null
['CVE-2017-12158']
Keycloak Reflected XSS
It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12158'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2904'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2905'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2906'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T19:14:49Z', 'nvd_published_at': '2017-10-26T17:29:00Z'}
1.4.0
GHSA-cxwh-vmhg-39r2
2022-07-08T19:14:16Z
2022-05-17T01:36:04Z
null
['CVE-2013-2254']
Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Sling
The deepGetOrCreateNode function in impl/operations/AbstractCreateOperation.java in org.apache.sling.servlets.post.bundle 2.2.0 and 2.3.0 in Apache Sling does not properly handle a NULL value that returned when the session does not have permissions to the root node, which allows remote attackers to cause a denial of se...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2254'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87765'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-2913'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/sling-dev/201...
{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:14:16Z', 'nvd_published_at': '2013-10-17T23:55:00Z'}
1.4.0
GHSA-cvcf-w75c-gw5r
2023-09-26T16:37:45Z
2022-05-24T16:58:52Z
null
['CVE-2019-13116']
Mulesoft Mule Unsafe Deserialization
The MuleSoft Mule runtime engine before 3.8.0 allows remote attackers to execute arbitrary code because of Java Deserialization, related to Apache Commons Collections.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mule.runtime:mule'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13116'}, {'type': 'WEB', 'url': 'https://docs.mulesoft.com/release-notes/mule-runtime/mule-3.8.0-release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/mulesoft/mule'}, {'type': 'WEB', 'url': 'https://threat.tevora.com/mulesoft-3-8-unauthe...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:23:50Z', 'nvd_published_at': '2019-10-16T20:15:00Z'}
1.4.0
GHSA-c3mp-9vx3-2rvv
2023-07-11T00:13:01Z
2022-05-24T17:42:35Z
null
['CVE-2021-3396']
OpenNMS Horizon RCE via JEXL2 expression
OpenNMS Meridian 2016, 2017, 2018 before 2018.1.25, 2019 before 2019.1.16, and 2020 before 2020.1.5, Horizon 1.2 through 27.0.4, and Newts <1.5.3 has Incorrect Access Control, which allows local and remote code execution using JEXL expressions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '27.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 27.0.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.opennms.features:org.opennms.feature...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3396'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/3281'}, {'type': 'WEB', 'url': 'https://issues.opennms.org/browse/NMS-13103'}, {'type': 'WEB', 'url': 'https://www.opennms.com/en/blog/2021-02-16-cve-2021-3396-full-security-di...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:13:01Z', 'nvd_published_at': '2021-02-17T21:15:00Z'}
1.4.0
GHSA-gc62-j469-9gjm
2023-08-01T23:31:39Z
2022-05-24T16:47:29Z
null
['CVE-2019-12274']
Rancher Privilege Escalation Vulnerability
In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/l...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.27'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12274'}, {'type': 'WEB', 'url': 'https://forums.rancher.com/t/rancher-release-v2-2-4-addresses-rancher-cve-2019-12274-and-cve-2019-12303/14466'}]
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:31:39Z', 'nvd_published_at': '2019-06-06T16:29:00Z'}
1.4.0
GHSA-pjw3-c74j-m9fj
2023-02-14T00:57:31Z
2022-05-24T16:45:43Z
null
['CVE-2016-7043']
Password in config file in KIE server
It has been reported that KIE server and Busitess Central before version 7.21.0.Final contain username and password as plaintext Java properties. Any app deployed on the same server would have access to these properties, thus granting access to ther services.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.kie.server:kie-server-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.21.0.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7043'}, {'type': 'WEB', 'url': 'https://github.com/kiegroup/droolsjbpm-integration/pull/1273'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7043'}]
{'cwe_ids': ['CWE-260'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:57:31Z', 'nvd_published_at': '2019-05-15T16:29:00Z'}
1.4.0
GHSA-m269-wj6g-c459
2022-06-17T21:31:28Z
2022-05-17T02:56:23Z
null
['CVE-2016-10127']
PySAML2 XML external entity attack
PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafted SAML XML request or response.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ecosystem_specific': {'affected_functions': ['saml2.create_class_from_xml_string', 'saml2.extension_element_from_string', 'saml2.soap.parse_soap_enveloped_saml_thingy', 'saml2.soap.class_instances_from_soap_enveloped_saml_thingies', 'saml2.soap.open_soap_envelope'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10127'}, {'type': 'WEB', 'url': 'https://github.com/rohe/pysaml2/issues/366'}, {'type': 'WEB', 'url': 'https://github.com/rohe/pysaml2/pull/379'}, {'type': 'WEB', 'url': 'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:31:28Z', 'nvd_published_at': '2017-03-03T15:59:00Z'}
1.4.0
GHSA-66x3-6cw3-v5gj
2022-05-24T20:50:46Z
2022-05-24T20:50:46Z
null
['CVE-2022-29173']
Improper Validation of Integrity Check Value in go-tuf
### Impact [go-tuf](https://github.com/theupdateframework/go-tuf) does not correctly implement the [client workflow](https://theupdateframework.github.io/specification/v1.0.28/index.html#detailed-client-workflow) for updating the metadata files for roles other than the root role. Specifically, checks for rollback atta...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/theupdateframework/go-tuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/theupdateframework/go-tuf/security/advisories/GHSA-66x3-6cw3-v5gj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29173'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/go-tuf/commit/ed6788e710fc3093a7ecc2d078bf734c0f200d8d'}, {'type'...
{'cwe_ids': ['CWE-354'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T20:50:46Z', 'nvd_published_at': '2022-05-05T23:15:00Z'}
1.4.0
GHSA-62pm-mgrh-7p69
2022-06-27T21:10:52Z
2022-05-24T17:01:40Z
null
['CVE-2019-16538']
Incorrect Authorization in Jenkins Script Security Plugin
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.67 and earlier related to the handling of default parameter expressions in closures allowed attackers to execute arbitrary code in sandboxed scripts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.68'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.67'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16538'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1658'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/11/21/1'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T21:10:52Z', 'nvd_published_at': '2019-11-21T15:15:00Z'}
1.4.0
GHSA-p364-xfp2-f9rr
2022-12-28T23:51:13Z
2022-05-24T17:22:18Z
null
['CVE-2020-2203']
CSRF vulnerability in Jenkins Fortify on Demand Plugin
A cross-site request forgery vulnerability in Jenkins Fortify on Demand Plugin 5.0.1 and earlier allows attackers to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs. This form validation method requires appropriate permission in Fortify on Demand Plugin 6.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fortify-on-demand-uploader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2203'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fortify-on-demand-uploader-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1691'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/os...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T23:51:13Z', 'nvd_published_at': '2020-07-02T15:15:00Z'}
1.4.0
GHSA-mp9r-rh95-f8f8
2023-07-17T20:46:51Z
2022-05-24T16:52:25Z
null
['CVE-2019-7885']
Magento 2 Community Edition RCE Vulnerability
Insufficient input validation in the config builder of the Elastic search module could lead to remote code execution in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This vulnerability could be abused by an authenticated user with the ability to configure the catalog search.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7885'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:46:51Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-7hf3-h28p-q6gx
2022-12-20T22:39:20Z
2022-05-24T17:27:07Z
null
['CVE-2020-2248']
Reflected XSS vulnerability in Jenkins JSGames Plugin
Jenkins JSGames Plugin 0.2 and earlier evaluates part of a URL as code, resulting in a reflected cross-site scripting (XSS) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jsgames'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2248'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jsgames-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1905'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:39:20Z', 'nvd_published_at': '2020-09-01T14:15:00Z'}
1.4.0
GHSA-fj32-6v7m-57pg
2022-06-27T14:25:21Z
2022-05-13T01:14:26Z
null
['CVE-2019-7611']
Improper Access Control in Elasticsearch
A permission issue was found in Elasticsearch versions before 5.6.15 and 6.6.1 when Field Level Security and Document Level Security are disabled and the _aliases, _shrink, or _split endpoints are used . If the elasticsearch.yml file has xpack.security.dls_fls.enabled set to false, certain permission checks are skipped...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7611'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077'}, {'type': 'PACKAGE', 'url': 'https://github.com/elastic/elasticsearch'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/s...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T14:25:21Z', 'nvd_published_at': '2019-03-25T19:29:00Z'}
1.4.0
GHSA-39mj-fpg2-3jrg
2023-08-07T20:56:50Z
2022-05-24T17:44:46Z
2023-08-07T20:56:50Z
['CVE-2021-28667']
StackStorm st2 Infinite Loop Condition
StackStorm before 3.4.1, in some situations, has an infinite loop that consumes all available memory and disk space. This can occur if Python 3.x is used, the locale is not utf-8, and there is an attempt to log Unicode data (from an action or rule name).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'st2client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28667'}, {'type': 'PACKAGE', 'url': 'https://github.com/StackStorm/st2'}, {'type': 'WEB', 'url': 'https://stackstorm.com/2021/03/10/stackstorm-v3-4-1-security-fix/'}]
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T22:59:05Z', 'nvd_published_at': '2021-03-18T03:15:00Z'}
1.4.0
GHSA-hf4p-mhc8-x2gp
2022-11-22T18:47:55Z
2022-05-14T01:09:51Z
null
['CVE-2017-5657']
Apache Archiva vulnerable to Cross Site Request Forgery
Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5657'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/archiva'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:47:55Z', 'nvd_published_at': '2017-05-22T18:29:00Z'}
1.4.0
GHSA-wqv4-9gr3-3qgh
2022-07-01T21:57:02Z
2022-05-14T01:04:35Z
null
['CVE-2017-1000395']
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
Jenkins 2.73.1 and earlier, 2.83 and earlier provides information about Jenkins user accounts which is generally available to anyone with Overall/Read permissions via the /user/(username)/api remote API. This included e.g. Jenkins users' email addresses if the Mailer Plugin is installed. The remote API now no longer in...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.73.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.73.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000395'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/7b1f8e96a8d97dd09e5e093fcdb010b3295acc77'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advis...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:57:02Z', 'nvd_published_at': '2018-01-26T02:29:00Z'}
1.4.0
GHSA-5j9f-5wmp-7f8h
2022-12-06T21:49:12Z
2022-05-24T16:58:49Z
null
['CVE-2019-10446']
Jenkins Cadence vManager Plugin disables SSL/TLS and hostname verification
Jenkins Cadence vManager Plugin prior to version 2.7.1 disables SSL/TLS and hostname verification globally for the Jenkins master JVM. This issue is patched in 2.7.1
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vmanager-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10446'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/vmanager-plugin/commit/639aa135ab57d9e23c5bedeb0a5e9518eb0f486e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vmanager-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/...
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:49:12Z', 'nvd_published_at': '2019-10-16T14:15:00Z'}
1.4.0
GHSA-2xvx-rw9p-xgfc
2022-12-02T21:10:55Z
2022-05-18T00:00:39Z
null
['CVE-2022-30945']
Sandbox bypass vulnerability through implicitly allowlisted platform Groovy files in Jenkins Pipeline: Groovy Plugin
Pipeline: Groovy Plugin allows pipelines to load Groovy source files. This is intended to be used to allow Global Shared Libraries to execute without sandbox protection. In Pipeline: Groovy Plugin 2689.v434009a_31b_f1 and earlier, any Groovy source files bundled with Jenkins core and plugins could be loaded this way a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2692.v76b'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2689.v434009a'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30945'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/workflow-cps-plugin/commit/76a7681702f42d65f77bbaa5463f146876ea62db'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/workflow-cps-plugin/commit/76b089ccd026b68012b0deb30c217395f7c...
{'cwe_ids': ['CWE-434', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:10:55Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-5qpp-v56f-mqfm
2023-02-08T20:00:43Z
2022-05-17T04:58:57Z
null
['CVE-2013-4294']
OpenStack Identity (Keystone) allows remote attackers to bypass intended access restrictions via revoked PKI token
The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2012.2.0'}, {'fixed': '2013.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4294'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:1285'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-4294'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/keystone/+bug/1202952'}, {'type': ...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T20:00:43Z', 'nvd_published_at': '2013-09-23T20:55:00Z'}
1.4.0
GHSA-fv4q-wm8c-wjg4
2023-09-26T19:52:42Z
2022-05-24T17:02:40Z
null
['CVE-2019-14909']
Keycloak Authentication Error
A vulnerability was found in Keycloak 7.x where the user federation LDAP bind type is none (LDAP anonymous bind), any password, invalid or valid will be accepted.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'last_affected': '7.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14909'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2019-14909'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14909'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-287', 'CWE-305'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:03:15Z', 'nvd_published_at': '2019-12-04T15:15:00Z'}
1.4.0
GHSA-p7v9-gjrh-563x
2023-07-20T23:32:15Z
2022-05-13T01:14:06Z
null
['CVE-2018-10891']
Moodle XSS Vulnerability
A flaw was found in moodle before versions 3.5.1, 3.4.4, 3.3.7, 3.1.13. When a quiz question bank is imported, it was possible for the question preview that is displayed to execute JavaScript that is written into the question bank.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10891'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/0b18d0c960c27994dd9870d286f2da3fa5868c06'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10891'}, {'type': 'WEB', 'url': 'https://moodle.org/mo...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T23:32:15Z', 'nvd_published_at': '2018-07-10T18:29:00Z'}
1.4.0
GHSA-97rj-p794-wq6m
2023-08-29T20:40:42Z
2022-05-17T04:01:59Z
null
['CVE-2012-5498']
Plone denial of service via Caching Bypass
queryCatalog.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to bypass caching and cause a denial of service via a crafted request to a collection.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5498'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1194'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2012-5498'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=874665'}, {'type'...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T20:40:42Z', 'nvd_published_at': '2014-09-30T14:55:00Z'}
1.4.0
GHSA-4qvx-qq5w-695p
2023-06-09T23:24:03Z
2022-05-14T01:36:20Z
null
['CVE-2018-19653']
HashiCorp Consul can use cleartext agent-to-agent RPC communication
HashiCorp Consul 0.5.1 through 1.4.0 can use cleartext agent-to-agent RPC communication because the `verify_outgoing` setting is improperly documented. NOTE: the vendor has provided reconfiguration steps that do not require a software upgrade.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.1'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19653'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/5069'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/b64e8b262f80397eab4f39c6ae7e14683cb9f55c'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicor...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:24:03Z', 'nvd_published_at': '2018-12-09T19:29:00Z'}
1.4.0
GHSA-xjmj-p278-4jp5
2023-02-08T19:56:12Z
2022-05-14T01:58:50Z
null
['CVE-2014-3517']
OpenStack Compute (Nova) Exposure of Sensitive Information to an Unauthorized Actor vulnerability
api/metadata/handler.py in OpenStack Compute (Nova) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2, when proxying metadata requests through Neutron, makes it easier for remote attackers to guess instance ID signatures via a brute-force attack that relies on timing differences in responses to instance m...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2013.2.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2014.0.0'}, {'fixed': '2014.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3517'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0940'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1084'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-3517'}, {'type': '...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T19:56:12Z', 'nvd_published_at': '2014-08-07T11:13:00Z'}
1.4.0
GHSA-7fjr-5hph-c2mh
2022-11-01T22:43:48Z
2022-05-13T01:31:35Z
null
['CVE-2019-1003013']
Cross-site Scripting in Jenkins Blue Ocean Plugin
A cross-site scripting vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier that allows attackers with permission to edit a user's description in Jenkins to have Blue Ocean render arbitrary HTML when using it as that user. This vulnerability is found in: - blueocean-commons/src/main/java/io/jenkins/blu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.blueocean:blueocean'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003013'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0326'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0327'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1204'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:43:48Z', 'nvd_published_at': '2019-02-06T16:29:00Z'}
1.4.0
GHSA-r2w2-h6r8-3r53
2023-01-24T15:55:07Z
2022-05-24T19:18:05Z
null
['CVE-2021-25971']
Camaleon CMS vulnerable to Uncaught Exception
In Camaleon CMS, versions 2.0.1 through 2.6.0 are vulnerable to an Uncaught Exception. The app's media upload feature crashes permanently when an attacker with a low privileged access uploads a specially crafted .svg file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'camaleon_cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.1'}, {'fixed': '2.6.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25971'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/commit/ab89584ab32b98a0af3d711e3f508a1d048147d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/owen2345/camaleon-cms'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/...
{'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T15:55:07Z', 'nvd_published_at': '2021-10-20T12:15:00Z'}
1.4.0
GHSA-7ff8-qfwx-8gx5
2022-12-16T22:25:34Z
2022-05-24T17:17:14Z
null
['CVE-2020-2182']
Improper masking of some secrets in Jenkins Credentials Binding Plugin
Credentials Binding Plugin allows specifying passwords and other secrets as environment variables, and will hide them from console output in builds. As a side effect of the fix for [SECURITY-698](https://www.jenkins.io/security/advisory/2018-02-05/#credentials-binding), `$` characters in secrets are escaped to `$$`. Th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials-binding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.22'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2182'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/credentials-binding-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-05-06/#SECURITY-1835'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:56:55Z', 'nvd_published_at': '2020-05-06T13:15:00Z'}
1.4.0
GHSA-42mm-x828-56c7
2022-12-13T18:55:05Z
2022-05-24T17:43:00Z
null
['CVE-2021-21617']
CSRF vulnerability in Jenkins Configuration Slicing Plugin
Configuration Slicing Plugin 1.51 and earlier does not require POST requests for the form submission endpoint reconfiguring slices, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to apply different slice configurations to attacker-specified jobs. Configuration Slic...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:configurationslicing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21617'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/configurationslicing-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2003'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T18:55:05Z', 'nvd_published_at': '2021-02-24T16:15:00Z'}
1.4.0
GHSA-77qc-gp37-hr26
2023-07-28T23:28:04Z
2022-05-14T02:22:17Z
null
['CVE-2016-7243']
ChakraCore RCE Vulnerability
The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7243'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1982'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c2787ef8fdb7401922e9ec6540e4e5895d11c631'}, {'type': 'WEB', 'url': 'https://docs.microso...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T23:28:04Z', 'nvd_published_at': '2016-11-10T06:59:00Z'}
1.4.0
GHSA-hgq9-q8g2-3jmg
2022-11-01T23:33:34Z
2022-05-13T01:22:47Z
null
['CVE-2019-6986']
Command Injection in VIVO Vitro
SPARQL Injection in VIVO Vitro v1.10.0 allows a remote attacker to execute arbitrary SPARQL via the uri parameter, leading to a regular expression denial of service (ReDoS), as demonstrated by crafted use of FILTER%20regex in a /individual?uri= request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.vivoweb:vitro-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6986'}, {'type': 'WEB', 'url': 'https://github.com/vivo-project/Vitro/pull/111'}, {'type': 'WEB', 'url': 'https://github.com/vivo-project/Vitro/pull/111/commits/248ef19107a5ac6f86304fd8f3bc75f3787f8d49'}, {'type': 'WEB', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-400', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:33:34Z', 'nvd_published_at': '2019-01-28T15:29:00Z'}
1.4.0
GHSA-jjmc-4p83-pp26
2023-08-09T13:17:07Z
2022-05-24T19:14:16Z
null
['CVE-2021-40824']
Logic error in Matrix SDK for Android
A logic error in the room key sharing functionality of Element Android before 1.2.2 and matrix-android-sdk2 (aka Matrix SDK for Android) before 1.2.2 leads to a situation where identity verification is inadequate and thus a key-requesting device can be impersonated.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.matrix.android:matrix-android-sdk2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40824'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-android-sdk2/releases/tag/v1.2.2'}, {'type': 'WEB', 'url': 'https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing'}]
{'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:17:07Z', 'nvd_published_at': '2021-09-13T19:15:00Z'}
1.4.0
GHSA-r5m2-g5gc-q43r
2023-02-08T19:35:12Z
2022-05-17T03:53:42Z
null
['CVE-2014-3661']
Jenkins Denial of Service vulnerability
Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to cause a denial of service (thread consumption) via vectors related to a CLI handshake.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.566'}, {'fixed': '1.583'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3661'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2014:1630'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0070'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-3661'}, {'type': '...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T19:35:12Z', 'nvd_published_at': '2014-10-16T19:55:00Z'}
1.4.0
GHSA-g784-q3p3-26rm
2023-09-26T16:55:01Z
2022-05-24T16:59:45Z
null
['CVE-2019-17606']
hexo-admin plugin for Node.js XSS Vulnerability
The Post editor functionality in the hexo-admin plugin versions 2.3.0 and earlier for Node.js is vulnerable to stored XSS via the content of a post.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'hexo-admin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17606'}, {'type': 'WEB', 'url': 'https://github.com/jaredly/hexo-admin/issues/185'}, {'type': 'WEB', 'url': 'https://github.com/418sec/hexo-admin/pull/2'}, {'type': 'WEB', 'url': 'https://github.com/jaredly/hexo-admin/pull/203'}, {'type': 'PACKAGE'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:38:56Z', 'nvd_published_at': '2019-10-23T17:15:00Z'}
1.4.0
GHSA-fcxw-hhxq-48wx
2022-06-02T20:40:00Z
2022-05-17T00:21:58Z
null
['CVE-2017-1000242']
Insecure temporary file usage in Jenkins Git Client Plugin
Jenkins Git Client Plugin 2.4.2 and earlier creates temporary file with insecure permissions resulting in information disclosure
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000242'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/git-client-plugin/commit/75ea3fe05650fc6ca09046a72493e2b3f066fb98'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-client-plugin'}, {'type': 'WEB', 'url': 'https://jenki...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:40:00Z', 'nvd_published_at': '2017-11-01T13:29:00Z'}