schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-876j-4q73-7f56
2022-12-12T21:08:02Z
2022-05-14T03:23:44Z
null
['CVE-2018-1000143']
Jenkins GitHub Pull Request Builder Plugin
GitHub Pull Request Builder Plugin stored the webhook secret shared between Jenkins and GitHub in plain text. This allowed users with Jenkins controller local file system access and Jenkins administrators to retrieve the stored password. The latter could result in exposure of the passwords through browser extensions, c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ghprb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000143'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-262'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:08:02Z', 'nvd_published_at': '2018-04-05T13:29:00Z'}
1.4.0
GHSA-pj65-3pf6-c5q4
2023-09-26T21:25:11Z
2022-05-24T17:12:47Z
null
['CVE-2019-15796']
python-apt Does Not Check Hash Signature
Python-apt doesn't check if hashes are signed in `Version.fetch_binary()` and `Version.fetch_source()` of apt/package.py or in `_fetch_archives()` of apt/cache.py in version 1.9.3ubuntu2 and earlier. This allows downloads from unsigned repositories which shouldn't be allowed and has been fixed in verisions 1.9.5, 1.9.0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-apt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.3ubuntu7.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'python-apt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ra...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15796'}, {'type': 'PACKAGE', 'url': 'https://github.com/excid3/python-apt'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4247-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4247-3/'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:36:38Z', 'nvd_published_at': '2020-03-26T13:15:00Z'}
1.4.0
GHSA-5ghg-233h-7j79
2023-08-24T12:59:15Z
2022-05-24T16:46:57Z
null
['CVE-2019-10047']
PyDio Stored XSS Vulnerability
A stored XSS vulnerability exists in the web application of Pydio through 8.2.2 that can be exploited by levering the file upload and file preview features of the application. An authenticated attacker can upload an HTML file containing JavaScript code and afterwards a file preview URL can be used to access the uploade...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pydio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10047'}, {'type': 'PACKAGE', 'url': 'https://github.com/mwiatrzyk/pydio'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/152292/Pydio-8-Command-Execution-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'https://www.secureauth.co...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T19:39:29Z', 'nvd_published_at': '2019-05-31T22:29:00Z'}
1.4.0
GHSA-25g4-p347-x748
2022-12-21T02:15:49Z
2022-05-24T17:30:18Z
null
['CVE-2020-2286']
Improper authorization due to caching in Jenkins Role-based Authorization Strategy Plugin
Role-based Authorization Strategy Plugin 2.12 and newer uses a cache to speed up permission lookups. Role-based Authorization Strategy Plugin 3.0 and earlier this cache is not invalidated properly when an administrator changes the permission configuration. This can result in permissions being granted long after the con...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:role-strategy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12'}, {'fixed': '3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2286'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1767'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/10/08/5'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T02:15:49Z', 'nvd_published_at': '2020-10-08T13:15:00Z'}
1.4.0
GHSA-4qhr-q7wf-94xp
2022-06-23T06:57:31Z
2022-05-24T17:09:22Z
null
['CVE-2020-8441']
Deserialization of Untrusted Data in JYaml
JYaml through 1.3 allows remote code execution during deserialization of a malicious payload through the load() function. NOTE: this is a discontinued product.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jyaml:jyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8441'}, {'type': 'WEB', 'url': 'https://gist.github.com/j0lt-github/f5141abcacae63d434ecae211422153a'}, {'type': 'WEB', 'url': 'https://github.com/mbechler/marshalsec'}, {'type': 'WEB', 'url': 'https://github.com/mbechler/marshalsec/blob/master/mar...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:57:31Z', 'nvd_published_at': '2020-02-19T17:15:00Z'}
1.4.0
GHSA-q6q9-83xw-mp6p
2022-06-28T22:26:23Z
2022-05-24T22:00:43Z
null
['CVE-2019-10402']
Improper Neutralization of Input During Web Page Generation in Jenkins
In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:combobox form control interpreted its item labels as HTML, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.176.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.176.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10402'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1525'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:26:23Z', 'nvd_published_at': '2019-09-25T16:15:00Z'}
1.4.0
GHSA-8vxv-2g8p-2249
2022-05-24T21:33:15Z
2022-05-24T21:33:15Z
null
['CVE-2022-29185']
Observable Timing Discrepancy in totp-rs
### Impact Token comparison was not constant time, and could theorically be used to guess value of an TOTP token, and thus reuse it in the same time window. The attacker would have to know the password beforehand nonetheless. ### Patches Library now used constant-time comparison. ### Workarounds No. ### For more inf...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'totp-rs'}, 'ecosystem_specific': {'affected_functions': ['totp_rs::TOTP::check']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/constantoine/totp-rs/security/advisories/GHSA-8vxv-2g8p-2249'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29185'}, {'type': 'WEB', 'url': 'https://github.com/constantoine/totp-rs/issues/13'}, {'type': 'WEB', 'url': 'https://github.com/constantoine...
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T21:33:15Z', 'nvd_published_at': '2022-05-20T20:15:00Z'}
1.4.0
GHSA-pcqv-c46v-2p4v
2023-08-28T23:28:04Z
2022-05-14T02:03:36Z
null
['CVE-2013-4260']
Ansible Arbitrary File Overwrite Vulnerability
lib/ansible/playbook/__init__.py in Ansible 1.2.x before 1.2.3, when playbook does not run due to an error, allows local users to overwrite arbitrary files via a symlink attack on a retry file with a predictable name in /var/tmp/ansible/.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'fixed': '1.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4260'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/d5948d59fc863fcec6efa62fa2791928ffc5a6d1'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=998227'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmc...
{'cwe_ids': ['CWE-281'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:28:04Z', 'nvd_published_at': '2013-09-16T19:14:00Z'}
1.4.0
GHSA-q469-j32f-h7vm
2023-07-11T00:21:33Z
2022-05-04T00:00:26Z
null
['CVE-2022-28118']
RCE in SiteServer CMS
SiteServer CMS v7.x, which SiteServer UI relies on, allows attackers to execute arbitrary code via a crafted plug-in.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'siteserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28118'}, {'type': 'WEB', 'url': 'https://github.com/siteserver/cms/issues/3386'}, {'type': 'WEB', 'url': 'https://github.com/Richard-Tang/SSCMS-PluginShell/blob/main/Detail.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/siteserver/cms'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:21:33Z', 'nvd_published_at': '2022-05-03T01:15:00Z'}
1.4.0
GHSA-6mvr-cq72-f66v
2023-07-25T19:35:12Z
2022-05-14T01:59:15Z
null
['CVE-2018-16277']
XWiki XSS Vulnerability
The Image Import function in XWiki through 10.7 has XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-pom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16277'}, {'type': 'WEB', 'url': 'https://mksec.tk/index.php/2018/09/27/cve-2018-16277-xss-in-xwiki/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:35:12Z', 'nvd_published_at': '2018-09-28T00:29:00Z'}
1.4.0
GHSA-pvwx-3jx5-24r2
2022-12-13T16:41:11Z
2022-05-24T17:46:47Z
null
['CVE-2021-21639']
Lack of type validation in agent related REST API in Jenkins
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node. This allows attackers with Computer/Configure permission to replace a node with one of a different type. Jenkins 2.287, LTS 2.277.2 validate...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.277.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.278'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21639'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-04-07/#SECURITY-1721'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/07...
{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:50:02Z', 'nvd_published_at': '2021-04-07T14:15:00Z'}
1.4.0
GHSA-x3p3-929j-pq66
2022-07-06T20:10:02Z
2022-05-17T03:53:41Z
null
['CVE-2015-7536']
Improper Neutralization of Input During Web Page Generation in Jenkins
Cross-site scripting (XSS) vulnerability in Jenkins before 1.640 and LTS before 1.625.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors related to workspaces and archived artifacts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.640'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7536'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-12-09'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:10:02Z', 'nvd_published_at': '2016-02-03T18:59:00Z'}
1.4.0
GHSA-59h8-h34r-q9cv
2022-11-22T19:22:34Z
2022-05-24T16:59:50Z
null
['CVE-2019-18393']
Ignite Realtime Openfire directory traversal vulnerability
PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability. Version 4.5.0-beta contains a fix for the issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0-beta'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18393'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/pull/1498'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/commit/cb900749d4e836b32cc6e2cc41cda17f252b977d'}, {'type': 'WEB', 'url': 'https://swarm.pts...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:22:34Z', 'nvd_published_at': '2019-10-24T11:15:00Z'}
1.4.0
GHSA-7ghm-rpc7-p7g5
2022-11-03T23:44:50Z
2022-05-13T01:16:08Z
null
['CVE-2013-2115']
Code injection in Apache Struts
A vulnerability introduced by forcing parameter inclusion in the URL and Anchor Tag allows remote command execution, session access and manipulation and XSS attacks. both the s:url and s:a tag provide an includeParams attribute. The main scope of that attribute is to understand whether includes http request parameter...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.14.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2115'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=967656'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-013'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-014'}, ...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:44:50Z', 'nvd_published_at': '2013-07-10T19:55:00Z'}
1.4.0
GHSA-r9fv-qpm9-rj4g
2022-06-28T23:46:58Z
2022-05-13T01:27:27Z
null
['CVE-2018-3831']
Exposure of Sensitive Information to an Unauthorized Actor in Elasticsearch
Elasticsearch Alerting and Monitoring in versions before 6.4.1 or 5.6.12 have an information disclosure issue when secrets are configured via the API. The Elasticsearch _cluster/settings API, when queried, could leak sensitive configuration information such as passwords, tokens, or usernames. This could allow an authen...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.6.0'}, {'fixed': '5.6.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3831'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-6-4-1-and-5-6-12-security-update/149035'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:46:58Z', 'nvd_published_at': '2018-09-19T19:29:00Z'}
1.4.0
GHSA-589q-75r3-mfq4
2023-07-20T11:13:08Z
2022-05-24T17:23:41Z
null
['CVE-2020-6165']
Silverstripe has Incorrect Default Permissions
SilverStripe 4.5.0 allows attackers to read certain records that should not have been placed into a result set. This affects silverstripe/recipe-cms. The automatic permission-checking mechanism in the silverstripe/graphql module does not provide complete protection against lists that are limited (e.g., through paginati...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/recipe-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6165'}, {'type': 'WEB', 'url': 'https://docs.silverstripe.org/en/4/changelogs/4.5.3/?_ga=2.170693920.105499209.1689776417-708940272.1689776417'}, {'type': 'WEB', 'url': 'https://docs.silverstripe.org/en/4/changelogs/4.6.0/?_ga=2.170693920.105499209...
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T11:13:08Z', 'nvd_published_at': '2020-07-15T21:15:00Z'}
1.4.0
GHSA-vmfx-gcfq-wvm2
2023-07-10T13:05:32Z
2022-05-24T17:03:17Z
null
['CVE-2019-5815']
Nokogiri implementation of libxslt vulnerable to heap corruption
Type confusion in `xsltNumberFormatGetMultipleLevel` prior to libxslt 1.1.33 could allow attackers to potentially exploit heap corruption via crafted XML data. Nokogiri prior to version 1.10.5 contains a vulnerable version of libxslt. Nokogiri version 1.10.5 upgrades the dependency to libxslt 1.1.34, which contains a ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5815'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/2630'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-5815.yml'}, {'type': 'PACKAGE', 'url': 'https://github.c...
{'cwe_ids': ['CWE-787', 'CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T21:30:28Z', 'nvd_published_at': '2019-12-11T01:15:00Z'}
1.4.0
GHSA-q46v-cj5v-hvg6
2022-07-13T15:47:55Z
2022-05-17T00:22:31Z
null
['CVE-2012-4449']
Use of a Broken or Risky Cryptographic Algorithm in Apache Hadoop
Apache Hadoop before 0.23.4, 1.x before 1.0.4, and 2.x before 2.0.2 generate token passwords using a 20-bit secret when Kerberos security features are enabled, which makes it easier for context-dependent attackers to crack secret keys via a brute-force attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4449'}, {'type': 'WEB', 'url': 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html#topic_1_0'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/hadoop-general/201210.mbox/%3CCA+z3+9FYdPmzBEaMZ71...
{'cwe_ids': ['CWE-327'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:47:55Z', 'nvd_published_at': '2017-10-30T19:29:00Z'}
1.4.0
GHSA-hc39-rjwp-qffq
2023-09-22T21:05:33Z
2022-05-01T18:03:36Z
null
['CVE-2007-2449']
Apache Tomcat XSS Vulnerabilities in Examples Web Application
Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the U...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'last_affected': '4.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-2449'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/34869'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'typ...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:05:33Z', 'nvd_published_at': '2007-06-14T23:30:00Z'}
1.4.0
GHSA-6429-3g3w-6mw5
2022-05-24T20:58:02Z
2022-05-07T00:00:31Z
null
['CVE-2022-25324']
Uncaught Exception in bignum
All versions of the npm package bignum are vulnerable to Denial of Service (DoS) due to a type-check exception in V8. When verifying the type of the second argument to the .powm function, V8 will crash regardless of Node try/catch blocks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'bignum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25324'}, {'type': 'PACKAGE', 'url': 'https://github.com/justmoon/node-bignum'}, {'type': 'WEB', 'url': 'https://github.com/justmoon/node-bignum/blob/ef2e02533e598d6df8421000033c4753cde89ee2/index.js#L111'}, {'type': 'WEB', 'url': 'https://snyk.io/v...
{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T20:58:02Z', 'nvd_published_at': '2022-05-06T20:15:00Z'}
1.4.0
GHSA-788w-269g-j92q
2023-07-21T20:33:53Z
2022-05-13T01:20:52Z
null
['CVE-2018-8391']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8354, CVE-2018-8456, CVE-2018-8457, CVE-2018-8459.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8391'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8391'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210419154033/http://www.securityfocus.com/bid/105231'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:33:53Z', 'nvd_published_at': '2018-09-13T00:29:00Z'}
1.4.0
GHSA-q4h5-g3w8-f9x7
2023-07-26T19:53:36Z
2022-05-14T01:22:02Z
null
['CVE-2017-6068']
Subrion CMS CSRF Vulnerability
Subrion CMS 4.0.5 has CSRF in `admin/blocks/add/`. The attacker can create any block, and can optionally insert XSS via the content parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-6068'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210126223835/http://www.securityfocus.com/bid/97091'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T19:53:36Z', 'nvd_published_at': '2017-03-27T02:59:00Z'}
1.4.0
GHSA-7h24-4x4c-69mf
2022-11-03T23:46:33Z
2022-05-24T17:03:49Z
null
['CVE-2019-16576']
Improper Authorization in Jenkins Alauda Kubernetes Suport Plugin
A missing permission check in Jenkins Alauda Kubernetes Suport Plugin 2.3.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing the Kubernetes service account token or credentials stored in ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.alauda.jenkins.plugins:alauda-kubernetes-support'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16576'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1602'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}]
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:46:33Z', 'nvd_published_at': '2019-12-17T15:15:00Z'}
1.4.0
GHSA-69vh-662j-v988
2023-07-31T18:54:23Z
2022-05-14T02:46:11Z
null
['CVE-2016-7137']
Plone Open Redirect Vulnerability
Multiple open redirect vulnerabilities in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the referer parameter to (1) `%2b%2bgroupdashboard%2b%2bplone.dashboard1%2bgroup/%2b/portlets.Actio...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'last_affected': '5.0.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'last_affected': '4.3.11'}]}]}, {'package': {'ec...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7137'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20160830/open-redirection-in-plone'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210625091607/http://www.securityfocus.com/bid/92752'}, {'type': 'WEB', 'url': 'https://web...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:54:23Z', 'nvd_published_at': '2017-03-07T16:59:00Z'}
1.4.0
GHSA-5h2q-4hrp-v9rr
2023-04-21T20:17:54Z
2022-05-17T05:12:01Z
null
['CVE-2012-3444']
Django vulnerable to Improper Restriction of Operations within the Bounds of a Memory Buffer
The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3444'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/da33d67181b53fe6cc737ac1220153814a1509f6'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:17:54Z', 'nvd_published_at': '2012-07-31T17:55:00Z'}
1.4.0
GHSA-5xv9-gp22-gqm5
2022-12-21T18:50:13Z
2022-05-24T17:30:19Z
null
['CVE-2020-2294']
Missing permission checks in Jenkins Maven Cascade Release Plugin
Jenkins Maven Cascade Release Plugin 1.3.2 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to start cascade builds and layout builds, and reconfigure the plugin.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.barchart.jenkins:maven-release-cascade'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2294'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/maven-release-cascade-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2049'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:50:13Z', 'nvd_published_at': '2020-10-08T13:15:00Z'}
1.4.0
GHSA-3q84-vrvx-rfvf
2022-12-16T20:24:54Z
2022-05-24T19:19:44Z
null
['CVE-2021-21687']
Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins
The agent-to-controller security subsystem limits which files on the Jenkins controller can be accessed by agent processes. Multiple vulnerabilities in the file path filtering implementation of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allow agent processes to read and write arbitrary files on the Jenkins con...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.303.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.303.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21687'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455'}]
{'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:48:59Z', 'nvd_published_at': '2021-11-04T17:15:00Z'}
1.4.0
GHSA-73xj-v6gc-g5p5
2023-08-29T19:32:42Z
2022-05-13T01:10:00Z
null
['CVE-2018-19422']
Subrion CMS RCE Vulnerability
`/panel/uploads` in Subrion CMS 4.2.1 allows remote attackers to execute arbitrary PHP code via a .pht or .phar file, because the .htaccess file omits these.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19422'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/801'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/commit/74359bcfaea424edda6d782a8ac25397c55972ab'}, {'type': 'WEB', 'url': 'http://packetstormsecuri...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:32:42Z', 'nvd_published_at': '2018-11-21T21:29:00Z'}
1.4.0
GHSA-3h7v-wqw7-ff28
2022-06-03T15:48:44Z
2022-05-24T22:28:08Z
null
['CVE-2021-25975']
Cross site scripting in publify
In publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS as a result of an unrestricted file upload. This issue allows a user with “publisher” role to inject malicious JavaScript via the uploaded html file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0'}, {'fixed': '9.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25975'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/d99c0870d3dbbfde7febdc6cad33199b84770101'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vul...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:48:44Z', 'nvd_published_at': '2021-11-10T11:15:00Z'}
1.4.0
GHSA-3295-h9qx-r82x
2022-07-08T18:48:11Z
2022-05-14T02:43:11Z
null
['CVE-2010-3700']
Authentication Bypass Using an Alternate Path or Channel in SpringSource Spring Security and Acegi Security
VMware SpringSource Spring Security 2.x before 2.0.6 and 3.x before 3.0.4, and Acegi Security 1.0.0 through 1.0.7, as used in IBM WebSphere Application Server (WAS) 6.1 and 7.0, allows remote attackers to bypass security constraints via a path parameter.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM',...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3700'}, {'type': 'WEB', 'url': 'https://issues.apache.org/bugzilla/show_bug.cgi?id=25015'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20110802082343/http://www.springsource.com/security/cve-2010-3700'}]
{'cwe_ids': ['CWE-288'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:48:11Z', 'nvd_published_at': '2010-10-29T19:00:00Z'}
1.4.0
GHSA-v9v9-xffq-rwr4
2022-07-06T19:51:12Z
2022-05-17T02:57:58Z
null
['CVE-2016-9909']
Improper Neutralization of Input During Web Page Generation in html5lib
The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cross-site scripting (XSS) attacks by leveraging mishandling of the < (less than) character in attribute values.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'html5lib'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.999999999'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9909'}, {'type': 'WEB', 'url': 'https://github.com/html5lib/html5lib-python/issues/11'}, {'type': 'WEB', 'url': 'https://github.com/html5lib/html5lib-python/issues/12'}, {'type': 'WEB', 'url': 'https://github.com/html5lib/html5lib-python/commit/9b8...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:51:12Z', 'nvd_published_at': '2017-02-22T16:59:00Z'}
1.4.0
GHSA-7h48-m3rw-vr27
2023-01-27T00:01:51Z
2022-05-17T05:31:08Z
null
['CVE-2008-7310']
Spree does not properly restrict the use of a hash to provide values for a model's attributes
Spree 0.2.0 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the Order state value and bypass the intended payment step via a modified URL, related to a "mass assignment" vulnerability.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-7310'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2008-7310.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree'}, {'type': 'WEB', 'url': 'https://spreecommerce.com/blog/security-vu...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:01:51Z', 'nvd_published_at': '2012-04-05T13:25:00Z'}
1.4.0
GHSA-x4cf-6jr3-3qvp
2022-06-27T17:02:32Z
2022-05-24T17:32:10Z
null
['CVE-2020-1915']
Out-of-bounds Read in Facebook Hermes
An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits ev...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hermes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1915'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/issues/373'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/commit/8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/h...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:00:13Z', 'nvd_published_at': '2020-10-26T21:15:00Z'}
1.4.0
GHSA-4c39-hj99-5h2r
2023-07-31T23:46:20Z
2022-05-13T01:12:09Z
null
['CVE-2015-6926']
OXID eShop user impersonation vulnerability
The OpenID Single Sign-On authentication functionality in OXID eShop before 4.5.0 allows remote attackers to impersonate users via the email address in a crafted authentication token.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'oxid-esales/oxideshop-ce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-6926'}, {'type': 'WEB', 'url': 'https://bugs.oxid-esales.com/view.php?id=6224'}, {'type': 'WEB', 'url': 'https://oxidforge.org/en/oxid-security-bulletin-2015-001.html'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T23:46:20Z', 'nvd_published_at': '2018-01-19T15:29:00Z'}
1.4.0
GHSA-wpmr-q825-x4c6
2023-08-07T19:59:14Z
2022-05-24T17:32:47Z
null
['CVE-2020-15703']
aptdaemon Information Disclosure via Improper Input Validation in Transaction class
There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check f...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'aptdaemon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15703'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ubuntu/+source/aptdaemon/+bug/1888235'}, {'type': 'PACKAGE', 'url': 'https://github.com/linuxmint/aptdaemon'}, {'type': 'WEB', 'url': 'https://github.com/linuxmint/aptdaemon/blob/4d24cb615...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T19:59:14Z', 'nvd_published_at': '2020-10-31T04:15:00Z'}
1.4.0
GHSA-q3cj-2r34-2cwc
2022-06-17T21:29:04Z
2022-05-17T02:51:56Z
null
['CVE-2016-9243']
Improper input validation in cryptography
HKDF in cryptography before 1.5.3 returns an empty byte-string if used with a length less than algorithm.digest_size.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9243'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/issues/3211'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874'}, {'type': 'WEB', 'url': 'https://cryptography.io/en/l...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:29:04Z', 'nvd_published_at': '2017-03-27T17:59:00Z'}
1.4.0
GHSA-47h6-hfpv-7phj
2023-08-01T22:37:20Z
2022-05-24T17:00:29Z
null
['CVE-2019-8159']
Magento 2 Community Edition RCE Vulnerability
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with system data manipulation privileges can execute aribitrary code through arbitrary file deletion and OS command injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8159'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:37:20Z', 'nvd_published_at': '2019-11-06T00:15:00Z'}
1.4.0
GHSA-mgfr-44wv-hqv6
2023-09-25T19:12:43Z
2022-05-24T16:52:28Z
null
['CVE-2019-7938']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to modify catalog p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7938'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:09:44Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-369m-2gv6-mw28
2023-07-27T14:58:44Z
2022-05-14T02:03:29Z
null
['CVE-2017-10784']
WEBrick RCE Vulnerability
The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'webrick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-10784'}, {'type': 'WEB', 'url': 'https://github.com/ruby/ruby/commit/6617c41292'}, {'type': 'WEB', 'url': 'https://github.com/ruby/webrick/commit/4ac0f3843ab82d1c31e1cfc719409208adef7813'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/2233...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T20:26:17Z', 'nvd_published_at': '2017-09-19T17:29:00Z'}
1.4.0
GHSA-9pf8-qqhm-7w64
2022-06-30T14:03:27Z
2022-05-13T01:30:17Z
null
['CVE-2018-10054']
Improper Input Validation in Datomic
H2 1.4.197, as used in Datomic before 0.9.5697 and other products, allows remote code execution because CREATE ALIAS can execute arbitrary Java code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.datomic:datomic-free'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5697'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.5656'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10054'}, {'type': 'WEB', 'url': 'https://forum.datomic.com/t/important-security-update-0-9-5697/379'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/582d4165de6507b0be82d5a6f9a1ce392ec43a00c9fed32bacf7fe1e@%3Cuser.ignite.apache.org%3...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T14:03:27Z', 'nvd_published_at': '2018-04-11T20:29:00Z'}
1.4.0
GHSA-w9gq-8q35-3jcc
2022-12-07T18:15:59Z
2022-05-13T01:48:32Z
null
['CVE-2018-1000111']
Jenkins Subversion Plugin Incorrect Authorization vulnerability
An improper authorization vulnerability exists in Jenkins Subversion Plugin version 2.10.2 and earlier in `SubversionStatus.java` and `SubversionRepositoryStatus.java` that allows an attacker with network access to obtain a list of nodes and users. As of version 2.10.3, the class handling requests to /subversion/ no lo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000111'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-02-26/#SECURITY-724'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T18:15:59Z', 'nvd_published_at': '2018-03-13T13:29:00Z'}
1.4.0
GHSA-g66q-grxc-64j3
2022-06-29T22:50:12Z
2022-05-14T03:10:57Z
null
['CVE-2018-12432']
Cross-site Scripting in JavaMelody
JavaMelody through 1.60.0 has XSS via the counter parameter in a clear_counter action to the /monitoring URI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.bull.javamelody:javamelody-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.61.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.60.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12432'}, {'type': 'WEB', 'url': 'https://github.com/javamelody/javamelody/commit/e0497c1980acebd257d3da78dfde29ae9bdffdf6'}, {'type': 'WEB', 'url': 'https://github.com/Hurdano/JavaMelody-XSS/wiki/Attack-Vector---JavaMelody'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:50:12Z', 'nvd_published_at': '2018-06-14T23:29:00Z'}
1.4.0
GHSA-7g54-vgp6-jj5w
2022-11-03T20:48:21Z
2022-05-17T02:26:22Z
null
['CVE-2016-6798']
XML External Entity Reference in Apache Sling
In the XSS Protection API module before 1.0.12 in Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to validate the input string, which allows for XXE attacks in all scripts which use this method to validate user input, potentially allowing an attacker to read sensitive data on the filesystem, perf...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.xss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6798'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b72c3a511592ec70729b3ec2d29302b6ce87bbeab62d4745617a6bd0@%3Cdev.sling.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99873'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T20:48:21Z', 'nvd_published_at': '2017-07-19T15:29:00Z'}
1.4.0
GHSA-v9gf-98vr-mgp2
2023-08-01T19:56:41Z
2022-05-13T01:08:49Z
null
['CVE-2015-5640']
baserCMS Access Control Bypass
baserCMS before 3.0.8 allows remote authenticated users to modify arbitrary user settings via a crafted request.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5640'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}, {'type': 'WEB', 'url': 'http://basercms.net/security/JVN04855224'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN04855224/index.html'}, {'type': 'WEB', 'url': 'http:/...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:56:41Z', 'nvd_published_at': '2015-10-06T01:59:00Z'}
1.4.0
GHSA-g888-g2pp-82hf
2023-07-25T20:55:06Z
2022-05-14T03:34:12Z
null
['CVE-2018-7711']
SimpleSAMLphp saml2 incorrect signature validation
HTTPRedirect.php in the saml2 library in SimpleSAMLphp before 1.15.4 has an incorrect check of return values in the signature validation utilities, allowing an attacker to get invalid signatures accepted as valid by forcing an error during validation. This occurs because of a dependency on PHP functionality that interp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7711'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/saml2/commit/4f6af7f69f29df8555a18b9bb7b646906b45924d'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/03/msg00017.html'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T20:55:06Z', 'nvd_published_at': '2018-03-05T22:29:00Z'}
1.4.0
GHSA-g34c-mg6m-xvxj
2023-02-06T20:08:53Z
2022-05-17T05:27:39Z
null
['CVE-2012-2395']
Cobbler subject to Command Injection
A Command Injection in action_power.py in Cobbler prior to v2.6.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) username or (2) password fields to the power_system method in the xmlrpc API.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2395'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/issues/141'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/6d9167e5da44eca56bdf42b5776097a6779aaadf'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ubuntu...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T20:08:52Z', 'nvd_published_at': '2012-06-16T00:55:00Z'}
1.4.0
GHSA-cr9c-rhq6-vh53
2022-05-25T20:13:42Z
2022-05-17T00:01:44Z
null
['CVE-2022-29351']
Code execution via SVG file upload in tiddlywiki
An arbitrary file upload vulnerability in the file upload module of Tiddlywiki5 v5.2.2 allows attackers to execute arbitrary code via a crafted SVG file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'tiddlywiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29351'}, {'type': 'PACKAGE', 'url': 'https://github.com/Jermolene/TiddlyWiki5'}, {'type': 'WEB', 'url': 'https://github.com/jimcola99/corruptsvgfile'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=F_DBx4psWns'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:13:42Z', 'nvd_published_at': '2022-05-16T14:15:00Z'}
1.4.0
GHSA-w66p-78g4-mr7g
2023-08-15T19:35:52Z
2022-05-17T01:39:21Z
null
['CVE-2012-5563']
OpenStack Keystone Insufficient token expiration
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5563'}, {'type': 'WEB', 'url': 'https://github.com/openstack/keystone/commit/38c7e46a640a94da4da89a39a5a1ea9c081f1eb5'}, {'type': 'WEB', 'url': 'https://github.com/openstack/keystone/commit/f9d4766249a72d8f88d75dcf1575b28dd3496681'}, {'type': 'WEB'...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:53:23Z', 'nvd_published_at': '2012-12-18T01:55:00Z'}
1.4.0
GHSA-89rq-27xp-vgv7
2023-08-29T18:25:00Z
2022-05-17T04:49:45Z
null
['CVE-2013-4190']
Plone Multiple cross-site scripting (XSS) vulnerabilities
Multiple cross-site scripting (XSS) vulnerabilities in (1) spamProtect.py, (2) pts.py, and (3) request.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'e...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4190'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978451'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:25:00Z', 'nvd_published_at': '2014-03-11T19:37:00Z'}
1.4.0
GHSA-qg25-hgjv-cg9q
2022-07-06T20:16:53Z
2022-05-13T01:25:41Z
null
['CVE-2015-3253']
Improper Neutralization of Special Elements in Output Used by a Downstream Component in Apache Groovy
The MethodClosure class in runtime/MethodClosure.java in Apache Groovy 1.7.0 through 2.4.3 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted serialized object.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.groovy:groovy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '2.4.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3253'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1376'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2486'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2596'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:16:53Z', 'nvd_published_at': '2015-08-13T14:59:00Z'}
1.4.0
GHSA-6xxc-4jc4-7jv3
2023-08-09T13:17:26Z
2022-05-24T22:28:20Z
null
['CVE-2021-33330']
Exposure of Resource to Wrong Sphere in Liferay Portal
Liferay Portal 7.2.0 through 7.3.2, and Liferay DXP 7.2 before fix pack 9, allows access to Cross-origin resource sharing (CORS) protected resources if the user is only authenticated using the portal session authentication, which allows remote attackers to obtain sensitive information including the targeted user’s emai...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.2.0'}, {'fixed': '7.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33330'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17127'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/120747720'}]
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:17:26Z', 'nvd_published_at': '2021-08-03T19:15:00Z'}
1.4.0
GHSA-rx4j-x3fh-9qwg
2023-09-25T19:36:16Z
2022-05-24T16:58:02Z
null
['CVE-2019-17106']
Centreon Sensitive Data Exposure
In Centreon Web through 2.8.29, disclosure of external components' passwords allows authenticated attackers to move laterally to external components.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.29'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17106'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/issues/7098'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/9311'}, {'type': 'PACKAGE', 'url': 'https://github.com/centreon/centreon-archiv...
{'cwe_ids': ['CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T22:12:18Z', 'nvd_published_at': '2019-10-08T13:15:00Z'}
1.4.0
GHSA-5xm4-jmpw-p6j3
2023-08-16T21:59:13Z
2022-05-17T19:57:32Z
null
['CVE-2014-4660']
Ansible discloses credential information
Ansible before 1.5.5 constructs filenames containing user and password fields on the basis of deb lines in `sources.list`, which might allow local users to obtain sensitive credential information in opportunistic circumstances by leveraging existence of a file that uses the `deb http://user:pass@server:port/` format.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4660'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/c4b5e46054c74176b2446c82d4df1a2610eddc08'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://secur...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:59:13Z', 'nvd_published_at': '2020-02-20T03:15:00Z'}
1.4.0
GHSA-3p5r-7cw3-2m67
2022-07-08T19:07:33Z
2022-05-17T02:44:28Z
null
['CVE-2013-2071']
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.40'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2071'}, {'type': 'WEB', 'url': 'https://issues.apache.org/bugzilla/show_bug.cgi?id=54178'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:07:33Z', 'nvd_published_at': '2013-06-01T14:21:00Z'}
1.4.0
GHSA-fx92-wh72-8g9q
2022-11-04T18:43:41Z
2022-05-17T01:17:12Z
null
['CVE-2017-3154']
Apache Atlas produces Stack trace in error response
Error responses from Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating included stack trace, exposing excessive information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:atlas-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1-incubating'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3154'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/atlas'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4a4fef91e067fd0d9da569e30867c1fa65e2a0520acde71ddefee0ea@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'http:...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:43:41Z', 'nvd_published_at': '2017-08-29T20:29:00Z'}
1.4.0
GHSA-v98h-rv7j-hf6j
2022-12-06T21:58:48Z
2022-05-24T17:01:41Z
null
['CVE-2019-16547']
Jenkins Google Compute Engine Plugin Missing Authorization vulnerability
Missing permission checks in various API endpoints in Jenkins Google Compute Engine Plugin 4.1.1 and earlier allow attackers with Overall/Read permission to obtain limited information about the plugin configuration and environment. Google Compute Engine Plugin 4.2.0 requires the appropriate Job/Configure permission to ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-compute-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16547'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1585'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/11/21/1'}]
{'cwe_ids': ['CWE-285', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:58:48Z', 'nvd_published_at': '2019-11-21T15:15:00Z'}
1.4.0
GHSA-9772-cwx9-r4cj
2022-07-27T21:35:21Z
2022-05-14T02:05:09Z
null
['CVE-2014-4616']
simplejson before 2.6.1 vulnerable to array index error
Array index error in the scanstring function in the _json module in Python 2.7 through 3.5 and simplejson before 2.6.1 allows context-dependent attackers to read arbitrary process memory via a negative index value in the idx argument to the raw_decode function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'simplejson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4616'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/12297'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752395'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1112285'}, {'type': 'PACK...
{'cwe_ids': ['CWE-129'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T21:35:21Z', 'nvd_published_at': '2017-08-24T20:29:00Z'}
1.4.0
GHSA-chqf-hx79-gxc6
2022-07-26T17:09:08Z
2022-05-17T02:58:54Z
null
['CVE-2017-5992']
Improper Restriction of XML External Entity Reference in Openpyxl
Openpyxl 2.4.1 resolves external entities by default, which allows remote attackers to conduct XXE attacks via a crafted .xlsx document.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'openpyxl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5992'}, {'type': 'WEB', 'url': 'https://bitbucket.org/openpyxl/openpyxl/commits/3b4905f428e1'}, {'type': 'WEB', 'url': 'https://bitbucket.org/openpyxl/openpyxl/issues/749'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T11:49:57Z', 'nvd_published_at': '2017-02-15T19:59:00Z'}
1.4.0
GHSA-66x7-2r56-fj77
2023-09-28T20:40:46Z
2022-05-14T01:36:13Z
null
['CVE-2019-7313']
Buildbot CRLF Injection
`www/resource.py` in Buildbot before 1.8.1 allows CRLF injection in the Location header of `/auth/login` and `/auth/logout` via the redirect parameter. This affects other web sites in the same domain.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'buildbot'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7313'}, {'type': 'WEB', 'url': 'https://github.com/buildbot/buildbot/pull/4584'}, {'type': 'WEB', 'url': 'https://github.com/buildbot/buildbot/commit/e781f110933e05ecdb30abc64327a2c7c9ff9c5a'}, {'type': 'PACKAGE', 'url': 'https://github.com/buildbo...
{'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:17:46Z', 'nvd_published_at': '2019-02-03T08:29:00Z'}
1.4.0
GHSA-4qrj-99r6-jfrh
2022-12-29T01:29:38Z
2022-05-24T17:28:24Z
null
['CVE-2020-2253']
Missing hostname validation in Email Extension Plugin
Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections. Email Extension Plugin 2.76 validates the SMTP hostname when connecting via TLS by default...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.76'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.75'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2253'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/email-ext-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1851'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:29:38Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-5wm2-38q5-5rxv
2023-09-25T14:35:32Z
2022-05-14T00:56:24Z
null
['CVE-2014-2683']
Several Zend Products Vulnerable to XXE and XEE attacks
Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and 2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler, ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and ZendService_Api before 1.0.0...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework1'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendopenid'}, 'ecosystem_specific':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2683'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140419041226/http://www.securityfocus.com/bid/66358'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150523055201/http://www.mandriva.com/en/support/security/advisories/advisory/...
{'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-25T14:35:32Z', 'nvd_published_at': '2014-11-16T00:59:00Z'}
1.4.0
GHSA-wr5c-4f2h-28m6
2023-09-28T20:45:29Z
2022-05-14T01:38:22Z
null
['CVE-2019-7169']
Croogo vulnerable to XSS in title field
A stored self-XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to `/admin/menus/menus/edit/3`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7169'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/issues/888'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/commit/cafaaabe2cef3d1d83652370e30563e6ad7c4158'}, {'type': 'PACKAGE', 'url': 'https://github.com/croogo/croogo'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:25:27Z', 'nvd_published_at': '2019-01-29T18:29:00Z'}
1.4.0
GHSA-6m8r-jh89-rq7h
2023-08-03T18:49:13Z
2022-05-24T17:43:45Z
null
['CVE-2021-25313']
Rancher Cross-site Scripting Vulnerability
A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rancher allows remote attackers to execute JavaScript via malicious links. This issue affects: SUSE Rancher Rancher versions prior to 2.5.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25313'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/issues/31583'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1181852'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/releases/tag/v2.3.11'}, {'ty...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T23:48:08Z', 'nvd_published_at': '2021-03-05T09:15:00Z'}
1.4.0
GHSA-x3pr-fcgm-wjgc
2022-07-27T20:55:20Z
2022-05-24T17:08:46Z
null
['CVE-2020-2111']
Subversion Plugin stored XSS vulnerability before v2.13.1
Jenkins Subversion Plugin 2.13.0 and earlier does not escape the error message for the Project Repository Base URL field form validation, resulting in a stored cross-site scripting vulnerability. Subversion Plugin 2.13.1 escapes the affected part of the error message.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2111'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1725'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T20:55:20Z', 'nvd_published_at': '2020-02-12T15:15:00Z'}
1.4.0
GHSA-q6rq-4whr-r879
2022-12-21T19:25:23Z
2022-05-24T17:33:07Z
null
['CVE-2020-2302']
Missing permission check in Jenkins Active Directory Plugin allows accessing domain health check page
Active Directory Plugin 2.19 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to access the domain health check diagnostic page. Active Directory Plugin 2.20 requires Overall/Administer permission to access the domain health check diagnostic page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:active-directory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2302'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/active-directory-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-1999'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T19:25:23Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-f5h9-3hpf-9j8m
2023-08-29T18:27:20Z
2022-05-17T04:49:45Z
null
['CVE-2013-4192']
Plone is vulnerable to email spoofing
sendto.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote authenticated users to spoof emails via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'e...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4192'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978464'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:27:20Z', 'nvd_published_at': '2014-03-11T19:37:00Z'}
1.4.0
GHSA-hr65-qq6p-87r4
2022-06-22T18:23:44Z
2022-05-24T19:02:19Z
null
['CVE-2021-22137']
Exposure of Sensitive Information to an Unauthorized Actor in Elasticsearch
In Elasticsearch versions before 7.11.2 and 6.8.15 a document disclosure flaw was found when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain cross-cluster search queries. This could result in the search disclosing the existence of documents t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.11.0'}, {'fixed': '7.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.11.1'}}, {'package': {'ecosys...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22137'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125'}, {'type': 'PACKAGE', 'url': 'https://github.com/elastic/elasticsearch'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advi...
{'cwe_ids': ['CWE-200', 'CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:23:44Z', 'nvd_published_at': '2021-05-13T18:15:00Z'}
1.4.0
GHSA-3p8r-p4q5-mc44
2023-02-23T20:31:42Z
2022-05-24T16:56:46Z
null
['CVE-2019-10416']
Violation Comments to GitLab Plugin has Insufficiently Protected Credentials
Violation Comments to GitLab Plugin stored API tokens unencrypted in job `config.xml` files and its global configuration file `org.jenkinsci.plugins.jvctgl.ViolationsToGitLabGlobalConfiguration.xml` on the Jenkins controller. These credentials could be viewed by users with Extended Read permission, or access to the Jen...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:violation-comments-to-gitlab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.29'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10416'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1577'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}]
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T20:31:42Z', 'nvd_published_at': '2019-09-25T16:15:00Z'}
1.4.0
GHSA-wfpw-hqjg-58ph
2022-12-21T18:50:46Z
2022-05-24T17:30:19Z
null
['CVE-2020-2295']
CSRF vulnerability in Jenkins Maven Cascade Release Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Maven Cascade Release Plugin 1.3.2 and earlier allows attackers to start cascade builds and layout builds, and reconfigure the plugin.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.barchart.jenkins:maven-release-cascade'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2295'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/maven-release-cascade-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2049'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:50:46Z', 'nvd_published_at': '2020-10-08T13:15:00Z'}
1.4.0
GHSA-qw28-g63m-jxqv
2022-09-09T00:51:51Z
2022-05-24T16:43:54Z
null
['CVE-2019-10306']
Sandbox bypass in ontrack Jenkins Plugin
A sandbox bypass vulnerability in Jenkins ontrack Plugin 3.4 and earlier allowed attackers with control over ontrack DSL definitions to execute arbitrary code on the Jenkins master JVM.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ontrack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10306'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ontrack-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-04-17/#SECURITY-1341'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108045'}]
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-09T00:51:51Z', 'nvd_published_at': '2019-04-18T17:29:00Z'}
1.4.0
GHSA-ccwp-633j-g29v
2022-12-20T22:10:51Z
2022-05-24T17:27:07Z
null
['CVE-2020-2250']
Passwords stored in plain text by Jenkins ReadyAPI Functional Testing Plugin
ReadyAPI Functional Testing Plugin 1.3 and earlier stores project passwords unencrypted in job `config.xml` files as part of its configuration. These project passwords can be viewed by attackers with Extended Read permission or access to the Jenkins controller file system. ReadyAPI Functional Testing Plugin 1.4 stores...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:soapui-pro-functional-testing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2250'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/soapui-pro-functional-testing-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com...
{'cwe_ids': ['CWE-256'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:10:51Z', 'nvd_published_at': '2020-09-01T14:15:00Z'}
1.4.0
GHSA-jgm2-m5cg-f66g
2022-07-13T21:29:14Z
2022-05-17T00:59:04Z
null
['CVE-2012-3546']
Authentication Bypass in Apache Tomcat
org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.36'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3546'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/f78c0cdfc8a3c2efdfe6df6b69e5e3daafa3f588'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://oval.cisecurity.org/repository/searc...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T21:29:14Z', 'nvd_published_at': '2012-12-19T11:55:00Z'}
1.4.0
GHSA-6mv9-hcx5-7mhh
2022-06-30T19:43:25Z
2022-05-13T01:01:03Z
null
['CVE-2018-1000067']
Server-Side Request Forgery in Jenkins
An improper authorization vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to have Jenkins submit HTTP GET requests and get limited information about the response.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.89.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.89.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000067'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/2d16b459205730d85e51499c2457109b234ca9d9'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advis...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T19:43:25Z', 'nvd_published_at': '2018-02-16T00:29:00Z'}
1.4.0
GHSA-8mvw-22r7-w6fq
2023-03-08T19:28:01Z
2022-05-05T02:48:30Z
null
['CVE-2013-0162']
ruby_parser allows local users to overwrite arbitrary files via symlink attack on temporary file with predictable name
The `diff_pp` function in `lib/gauntlet_rubyparser.rb` in the ruby_parser gem 3.1.1 and earlier for Ruby allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in `/tmp`.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby_parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.2'}, {'fixed': '3.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0162'}, {'type': 'WEB', 'url': 'https://github.com/seattlerb/ruby_parser/commit/506c7e13cff6f8715385fa8488b621028b4ad280'}, {'type': 'WEB', 'url': 'https://github.com/seattlerb/ruby_parser/commit/c35acd878d50a8e4ea35933e3fbdc493421d422c'}, {'type':...
{'cwe_ids': ['CWE-377'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T19:28:01Z', 'nvd_published_at': '2013-03-01T05:40:00Z'}
1.4.0
GHSA-w37f-pvvx-wcwm
2022-06-02T14:50:29Z
2022-05-19T00:00:16Z
null
['CVE-2022-30600']
Incorrect Calculation in moodle
A flaw was found in moodle where logic used to count failed login attempts could result in the account lockout threshold being bypassed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30600'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/59b5858da200f63ecb59a9113af2b99ef1496fe5'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2083613'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodl...
{'cwe_ids': ['CWE-682'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T14:50:29Z', 'nvd_published_at': '2022-05-18T18:15:00Z'}
1.4.0
GHSA-qff8-g48j-pwpw
2023-09-22T21:05:30Z
2022-05-01T18:13:14Z
null
['CVE-2007-3382']
Apache Tomcat treats single quotes as delimiters in cookies
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (`'`) as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'last_affected': '6.0.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-3382'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/36006'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E'}, {'typ...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:05:30Z', 'nvd_published_at': '2007-08-14T22:17:00Z'}
1.4.0
GHSA-c6mx-gwgr-mfm2
2023-07-21T18:40:44Z
2022-05-13T01:18:42Z
null
['CVE-2018-0995']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0995'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/396d78f60a3d8444218253523365965f97942225'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0995'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T18:40:44Z', 'nvd_published_at': '2018-04-12T01:29:00Z'}
1.4.0
GHSA-q2mx-j4x2-2h74
2022-05-24T22:03:07Z
2022-05-24T22:03:07Z
null
['CVE-2022-29214']
URL Redirection to Untrusted Site ('Open Redirect') in next-auth
### Impact We found that this vulnerability is present when the developer is implementing an OAuth 1 provider (by extension, it means Twitter, which is the only built-in provider using OAuth 1), but **upgrading** is **still recommended**. `next-auth` v3 users before version 3.29.3 are impacted. (We recommend upgradin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-q2mx-j4x2-2h74'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29214'}, {'type': 'PACKAGE', 'url': 'https://github.com/nextauthjs/next-auth'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-au...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:03:07Z', 'nvd_published_at': '2022-05-21T00:15:00Z'}
1.4.0
GHSA-ppwv-mvqg-q89h
2022-12-02T20:22:45Z
2022-05-18T00:00:41Z
null
['CVE-2022-30961']
Cross-site Scripting in Jenkins Autocomplete Parameter Plugin
Jenkins Autocomplete Parameter Plugin 1.1 and earlier does not escape the name of Dropdown Autocomplete and Auto Complete String parameters on views displaying parameters. This results in stored cross-site scripting (XSS) vulnerabilities exploitable by attackers with Item/Configure permission. Exploitation of this vul...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:autocomplete-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30961'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/autocomplete-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2717'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:25:45Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-hc72-vj3g-5g2g
2022-06-07T21:13:52Z
2022-05-26T00:01:31Z
null
['CVE-2022-29362']
Cross-site Scripting in ZKEACMS
A cross-site scripting (XSS) vulnerability in /navigation/create?ParentID=%23 of ZKEACMS v3.5.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the ParentID parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'ZKEACMS.Publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29362'}, {'type': 'WEB', 'url': 'https://github.com/SeriaWei/ZKEACMS/issues/457'}, {'type': 'WEB', 'url': 'https://github.com/SeriaWei/ZKEACMS/commit/833c5460dc5c6152092f6ad54b8b832870a59903'}, {'type': 'PACKAGE', 'url': 'https://github.com/SeriaWe...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T21:13:52Z', 'nvd_published_at': '2022-05-25T01:15:00Z'}
1.4.0
GHSA-5ppx-rgw2-xg23
2022-07-01T22:03:22Z
2022-05-14T01:04:30Z
null
['CVE-2017-1000392']
Improper Neutralization of Input During Web Page Generation in Jenkins
Jenkins 2.88 and earlier; 2.73.2 and earlier Autocompletion suggestions for text fields were not escaped, resulting in a persisted cross-site scripting vulnerability if the source for the suggestions allowed specifying text that includes HTML metacharacters like less-than and greater-than characters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.73.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.73.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000392'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/f67068170b55633571e5462e52b6124b23d7cb84'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advis...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T22:03:22Z', 'nvd_published_at': '2018-01-26T02:29:00Z'}
1.4.0
GHSA-g6hf-f9cq-q7w7
2022-07-07T23:20:49Z
2022-05-13T01:02:39Z
null
['CVE-2013-6429']
Cross-Site Request Forgery in Spring Framework
The SourceHttpMessageConverter in Spring MVC in Spring Framework before 3.2.5 and 4.0.0.M1 through 4.0.0.RC1 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue, an...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.5.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.4.RELEASE'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6429'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/15704'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:20:49Z', 'nvd_published_at': '2014-01-26T16:58:00Z'}
1.4.0
GHSA-rp9p-863f-9c4h
2023-02-14T01:00:04Z
2022-05-17T03:46:33Z
null
['CVE-2012-6092']
Cross-site Scripting in Apache ActiveMQ
Multiple cross-site scripting (XSS) vulnerabilities in the web demos in Apache ActiveMQ before 5.8.0 allow remote attackers to inject arbitrary web script or HTML via (1) the refresh parameter to PortfolioPublishServlet.java (aka demo/portfolioPublish or Market Data Publisher), or vectors involving (2) debug logs or (3...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6092'}, {'type': 'WEB', 'url': 'https://fisheye6.atlassian.com/changelog/activemq?cs=1399577'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AMQ-4115'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/secure/ReleaseNote.jspa...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:00:04Z', 'nvd_published_at': '2013-04-21T21:55:00Z'}
1.4.0
GHSA-hmmx-wxh4-9w8w
2023-07-31T21:50:15Z
2022-05-17T02:36:38Z
null
['CVE-2016-9857']
phpMyAdmin XSS Vulnerability
An issue was discovered in phpMyAdmin. XSS is possible because of a weakness in a regular expression used in some JavaScript processing. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4'}, {'fixed': '4.4....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9857'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123194716/http://www.securityfocus.com/bid/94530'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/P...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:50:15Z', 'nvd_published_at': '2016-12-11T02:59:00Z'}
1.4.0
GHSA-xw5f-g937-wgm2
2023-07-27T00:55:03Z
2022-05-14T04:03:59Z
null
['CVE-2017-11889']
ChakraCore RCE Vulnerability
ChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11889'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4411'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/66b9abb148705d2a36062931cd5a8466a588e6e4'}, {'type': 'WEB', 'url': 'https://portal.msrc...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T00:55:03Z', 'nvd_published_at': '2017-12-12T21:29:00Z'}
1.4.0
GHSA-22q6-wwq7-2jj9
2023-02-08T18:06:23Z
2022-05-17T04:56:52Z
null
['CVE-2013-1865']
OpenStack Keystone Improper Authentication vulnerability
OpenStack Keystone Folsom (2012.2) does not properly perform revocation checks for Keystone PKI tokens when done through a server, which allows remote attackers to bypass intended access restrictions via a revoked PKI token.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2012.2'}, {'fixed': '2012.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1865'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0708'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-1865'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/keystone/+bug/1129713'}, {'type': ...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:06:23Z', 'nvd_published_at': '2013-03-22T21:55:00Z'}
1.4.0
GHSA-49m5-2838-q2rv
2023-08-07T20:34:37Z
2022-05-17T19:57:14Z
null
['CVE-2014-2686']
Ansible unsafe evaluation of some strings
Ansible prior to 1.5.4 mishandles the evaluation of some strings.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['ansible.utils.safe_eval']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2686'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/998793fd0ab55705d57527a38cee5e83f535974c'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!searchin/ansible-project/1.5.4/ansible-project/MUQxiKwSQDc/id6aVaawVboJ'...
{'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T20:34:37Z', 'nvd_published_at': '2020-01-09T13:15:00Z'}
1.4.0
GHSA-96mh-7xpr-qcgw
2023-07-21T20:43:17Z
2022-05-13T01:24:44Z
null
['CVE-2018-7198']
October CMS XSS
October CMS through 1.0.431 allows XSS by entering HTML on the Add Posts page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'october/october'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.431'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7198'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/44144/'}, {'type': 'WEB', 'url': 'http://securitywarrior9.blogspot.com/2018/02/html-injection-october-cms.html...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:43:17Z', 'nvd_published_at': '2018-02-18T03:29:00Z'}
1.4.0
GHSA-8p5x-w9cv-92hv
2023-07-26T19:22:49Z
2022-05-13T01:41:13Z
null
['CVE-2017-1000361']
OpenDaylight Controller DoS
DOMRpcImplementationNotAvailableException when sending Port-Status packets to OpenDaylight. Controller launches exceptions and consumes more CPU resources. Component: OpenDaylight is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opendaylight.controller:releasepom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000361'}, {'type': 'WEB', 'url': 'https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_2016.pdf'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T19:22:49Z', 'nvd_published_at': '2017-04-24T16:59:00Z'}
1.4.0
GHSA-rj7p-rfgp-852x
2022-06-27T16:12:09Z
2022-05-24T17:00:01Z
null
['CVE-2019-0205']
Loop with Unreachable Exit Condition in Apache Thrift
In Apache Thrift all versions up to and including 0.12.0, a server or client may run into an endless loop when feed with specific input data. Because the issue had already been partially fixed in version 0.11.0, depending on the installed version it affects only certain language bindings.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.12.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0205'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T16:12:09Z', 'nvd_published_at': '2019-10-29T19:15:00Z'}
1.4.0
GHSA-4cvm-5776-jx9f
2023-08-16T22:07:25Z
2022-05-14T02:03:45Z
null
['CVE-2014-3498']
Ansible Arbitrary Code Execution
User module in ansible before 1.6.6 is vulnerable to command execution. Ansible can get the result of remote command in variable, which may come from untrusted source of input. If the content of variable isn't properly filtered and when attempting to use the variable, it will trigger a function that passes it through j...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3498'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/8ed6350e65c82292a631f08845dfaacffe7f07f5'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1335551'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:07:25Z', 'nvd_published_at': '2017-06-08T18:29:00Z'}
1.4.0
GHSA-cg4h-cfjp-h3x2
2022-12-22T13:50:16Z
2022-05-24T17:33:09Z
null
['CVE-2020-2319']
Password stored in plain text by Jenkins VMware Lab Manager Slaves Plugin
Jenkins VMware Lab Manager Slaves Plugin 0.2.8 and earlier stores a password unencrypted in the global `config.xml` file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:labmanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2319'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/labmanager-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2084'}]
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:50:16Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-66p6-7p29-55p9
2023-07-25T19:14:01Z
2022-05-14T02:20:59Z
null
['CVE-2018-14774']
Symfony Host Header Injection
An issue was discovered in HttpKernel in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. When using HttpCache, the values of the X-Forwarded-Host headers are implicitly set as trusted while this should be forbidden, leading t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'last_affected': '2.7.48'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'last_affecte...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14774'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/725dee4cd8b4ccd52e335ae4b4522242cea9bd4a'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2018-14774-possible-host-header-injection-when-using-httpcache'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:14:01Z', 'nvd_published_at': '2018-08-03T17:29:00Z'}
1.4.0
GHSA-jcp9-796g-pv9p
2022-07-07T23:29:01Z
2022-05-17T03:56:06Z
null
['CVE-2013-5679']
Missing Cryptographic Step in OWASP Enterprise Security API for Java
The authenticated-encryption feature in the symmetric-encryption implementation in the OWASP Enterprise Security API (ESAPI) for Java 2.x before 2.1.0 does not properly resist tampering with serialized ciphertext, which makes it easier for remote attackers to bypass intended cryptographic protection mechanisms via an a...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.esapi:esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5679'}, {'type': 'WEB', 'url': 'http://code.google.com/p/owasp-esapi-java/issues/detail?id=306'}, {'type': 'WEB', 'url': 'http://lists.owasp.org/pipermail/esapi-dev/2013-August/002285.html'}, {'type': 'WEB', 'url': 'http://owasp-esapi-java.googleco...
{'cwe_ids': ['CWE-325'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:29:01Z', 'nvd_published_at': '2013-09-30T17:09:00Z'}
1.4.0
GHSA-wc2g-9j98-vcgw
2023-01-06T17:03:11Z
2022-05-24T17:10:29Z
null
['CVE-2020-2152']
Jenkins Subversion Release Manager Plugin vulnerable to cross-site scripting (XSS)
Subversion Release Manager Plugin 1.2 and earlier does not escape the error message for the Repository URL field form validation. This results in a reflected cross-site scripting vulnerability that can also be exploited similar to a stored cross-site scripting vulnerability by users with Job/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:svn-release-mgr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2152'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/svn-release-mgr-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1727'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T17:03:11Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}
1.4.0
GHSA-gjq3-997p-hg6f
2023-07-31T22:11:40Z
2022-05-13T01:41:13Z
null
['CVE-2017-1000360']
OpenDaylight NULL Pointer Dereference
StreamCorruptedException and NullPointerException in OpenDaylight odl-mdsal-xsql. Controller launches exceptions in the console. Component: OpenDaylight odl-mdsal-xsql is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opendaylight.controller:releasepom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000360'}, {'type': 'WEB', 'url': 'https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_2016.pdf'}]
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:11:40Z', 'nvd_published_at': '2017-04-24T16:59:00Z'}
1.4.0
GHSA-p9rc-x48f-582x
2022-12-28T22:45:26Z
2022-05-24T17:28:27Z
null
['CVE-2020-2274']
Passwords stored in plain text by ElasTest Plugin
Jenkins ElasTest Plugin 1.2.1 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:elastest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2274'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/elastest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-2014'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-312'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T22:45:26Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-vxhj-3x7p-jxp5
2022-07-06T19:44:49Z
2022-05-17T03:49:16Z
null
['CVE-2016-6345']
Exposure of Sensitive Information to an Unauthorized Actor in RESTEasy
RESTEasy allows remote authenticated users to obtain sensitive information by leveraging "insufficient use of random values" in async jobs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.20.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.19.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6345'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1372117'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:44:49Z', 'nvd_published_at': '2016-09-07T18:59:00Z'}
1.4.0
GHSA-rpjm-422r-95mh
2023-08-24T20:27:39Z
2022-05-17T00:00:37Z
null
['CVE-2022-30126']
Regular expression denial of service in apache tika
In Apache Tika, a regular expression in our StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This was o...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.17'}, {'fixed': '1.28.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika'}, 'ecosystem_specific': {'affected_funct...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30126'}, {'type': 'WEB', 'url': 'https://github.com/apache/tika/commit/83b0de4d60161ebd4bc224141a959ac8c18d95f4'}, {'type': 'WEB', 'url': 'https://github.com/apache/tika/commit/a36711610fa1f6f5ba0f594803415af795e0b265'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:29:25Z', 'nvd_published_at': '2022-05-16T17:15:00Z'}
1.4.0
GHSA-h86w-m5rm-xr33
2023-02-14T00:32:49Z
2022-05-17T05:20:42Z
null
['CVE-2012-1618']
Unescaped parameters in the PostgreSQL JDBC driver
Interaction error in the PostgreSQL JDBC driver before 8.2, when used with a PostgreSQL server with the "standard_conforming_strings" option enabled, such as the default configuration of PostgreSQL 9.1, does not properly escape unspecified JDBC statement parameters, which allows remote attackers to perform SQL injectio...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1618'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=754273'}, {'type': 'PACKAGE', 'url': 'https://github.com/pgjdbc/pgjdbc'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2012-03/0126.html'}, {'type...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:32:49Z', 'nvd_published_at': '2012-10-06T22:55:00Z'}