schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-876j-4q73-7f56 | 2022-12-12T21:08:02Z | 2022-05-14T03:23:44Z | null | ['CVE-2018-1000143'] | Jenkins GitHub Pull Request Builder Plugin | GitHub Pull Request Builder Plugin stored the webhook secret shared between Jenkins and GitHub in plain text. This allowed users with Jenkins controller local file system access and Jenkins administrators to retrieve the stored password. The latter could result in exposure of the passwords through browser extensions, c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ghprb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000143'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-262'}] | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:08:02Z', 'nvd_published_at': '2018-04-05T13:29:00Z'} |
1.4.0 | GHSA-pj65-3pf6-c5q4 | 2023-09-26T21:25:11Z | 2022-05-24T17:12:47Z | null | ['CVE-2019-15796'] | python-apt Does Not Check Hash Signature | Python-apt doesn't check if hashes are signed in `Version.fetch_binary()` and `Version.fetch_source()` of apt/package.py or in `_fetch_archives()` of apt/cache.py in version 1.9.3ubuntu2 and earlier. This allows downloads from unsigned repositories which shouldn't be allowed and has been fixed in verisions 1.9.5, 1.9.0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-apt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.3ubuntu7.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'python-apt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ra... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15796'}, {'type': 'PACKAGE', 'url': 'https://github.com/excid3/python-apt'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4247-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4247-3/'}] | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:36:38Z', 'nvd_published_at': '2020-03-26T13:15:00Z'} |
1.4.0 | GHSA-5ghg-233h-7j79 | 2023-08-24T12:59:15Z | 2022-05-24T16:46:57Z | null | ['CVE-2019-10047'] | PyDio Stored XSS Vulnerability | A stored XSS vulnerability exists in the web application of Pydio through 8.2.2 that can be exploited by levering the file upload and file preview features of the application. An authenticated attacker can upload an HTML file containing JavaScript code and afterwards a file preview URL can be used to access the uploade... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pydio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10047'}, {'type': 'PACKAGE', 'url': 'https://github.com/mwiatrzyk/pydio'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/152292/Pydio-8-Command-Execution-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'https://www.secureauth.co... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T19:39:29Z', 'nvd_published_at': '2019-05-31T22:29:00Z'} |
1.4.0 | GHSA-25g4-p347-x748 | 2022-12-21T02:15:49Z | 2022-05-24T17:30:18Z | null | ['CVE-2020-2286'] | Improper authorization due to caching in Jenkins Role-based Authorization Strategy Plugin | Role-based Authorization Strategy Plugin 2.12 and newer uses a cache to speed up permission lookups. Role-based Authorization Strategy Plugin 3.0 and earlier this cache is not invalidated properly when an administrator changes the permission configuration. This can result in permissions being granted long after the con... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:role-strategy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12'}, {'fixed': '3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2286'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1767'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/10/08/5'}] | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T02:15:49Z', 'nvd_published_at': '2020-10-08T13:15:00Z'} |
1.4.0 | GHSA-4qhr-q7wf-94xp | 2022-06-23T06:57:31Z | 2022-05-24T17:09:22Z | null | ['CVE-2020-8441'] | Deserialization of Untrusted Data in JYaml | JYaml through 1.3 allows remote code execution during deserialization of a malicious payload through the load() function. NOTE: this is a discontinued product. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jyaml:jyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8441'}, {'type': 'WEB', 'url': 'https://gist.github.com/j0lt-github/f5141abcacae63d434ecae211422153a'}, {'type': 'WEB', 'url': 'https://github.com/mbechler/marshalsec'}, {'type': 'WEB', 'url': 'https://github.com/mbechler/marshalsec/blob/master/mar... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:57:31Z', 'nvd_published_at': '2020-02-19T17:15:00Z'} |
1.4.0 | GHSA-q6q9-83xw-mp6p | 2022-06-28T22:26:23Z | 2022-05-24T22:00:43Z | null | ['CVE-2019-10402'] | Improper Neutralization of Input During Web Page Generation in Jenkins | In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:combobox form control interpreted its item labels as HTML, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.176.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.176.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10402'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1525'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:26:23Z', 'nvd_published_at': '2019-09-25T16:15:00Z'} |
1.4.0 | GHSA-8vxv-2g8p-2249 | 2022-05-24T21:33:15Z | 2022-05-24T21:33:15Z | null | ['CVE-2022-29185'] | Observable Timing Discrepancy in totp-rs | ### Impact
Token comparison was not constant time, and could theorically be used to guess value of an TOTP token, and thus reuse it in the same time window. The attacker would have to know the password beforehand nonetheless.
### Patches
Library now used constant-time comparison.
### Workarounds
No.
### For more inf... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'totp-rs'}, 'ecosystem_specific': {'affected_functions': ['totp_rs::TOTP::check']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/constantoine/totp-rs/security/advisories/GHSA-8vxv-2g8p-2249'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29185'}, {'type': 'WEB', 'url': 'https://github.com/constantoine/totp-rs/issues/13'}, {'type': 'WEB', 'url': 'https://github.com/constantoine... | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T21:33:15Z', 'nvd_published_at': '2022-05-20T20:15:00Z'} |
1.4.0 | GHSA-pcqv-c46v-2p4v | 2023-08-28T23:28:04Z | 2022-05-14T02:03:36Z | null | ['CVE-2013-4260'] | Ansible Arbitrary File Overwrite Vulnerability | lib/ansible/playbook/__init__.py in Ansible 1.2.x before 1.2.3, when playbook does not run due to an error, allows local users to overwrite arbitrary files via a symlink attack on a retry file with a predictable name in /var/tmp/ansible/. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'fixed': '1.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4260'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/d5948d59fc863fcec6efa62fa2791928ffc5a6d1'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=998227'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmc... | {'cwe_ids': ['CWE-281'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:28:04Z', 'nvd_published_at': '2013-09-16T19:14:00Z'} |
1.4.0 | GHSA-q469-j32f-h7vm | 2023-07-11T00:21:33Z | 2022-05-04T00:00:26Z | null | ['CVE-2022-28118'] | RCE in SiteServer CMS | SiteServer CMS v7.x, which SiteServer UI relies on, allows attackers to execute arbitrary code via a crafted plug-in. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'siteserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28118'}, {'type': 'WEB', 'url': 'https://github.com/siteserver/cms/issues/3386'}, {'type': 'WEB', 'url': 'https://github.com/Richard-Tang/SSCMS-PluginShell/blob/main/Detail.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/siteserver/cms'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:21:33Z', 'nvd_published_at': '2022-05-03T01:15:00Z'} |
1.4.0 | GHSA-6mvr-cq72-f66v | 2023-07-25T19:35:12Z | 2022-05-14T01:59:15Z | null | ['CVE-2018-16277'] | XWiki XSS Vulnerability | The Image Import function in XWiki through 10.7 has XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-pom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16277'}, {'type': 'WEB', 'url': 'https://mksec.tk/index.php/2018/09/27/cve-2018-16277-xss-in-xwiki/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:35:12Z', 'nvd_published_at': '2018-09-28T00:29:00Z'} |
1.4.0 | GHSA-pvwx-3jx5-24r2 | 2022-12-13T16:41:11Z | 2022-05-24T17:46:47Z | null | ['CVE-2021-21639'] | Lack of type validation in agent related REST API in Jenkins | Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node.
This allows attackers with Computer/Configure permission to replace a node with one of a different type.
Jenkins 2.287, LTS 2.277.2 validate... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.277.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.278'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21639'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-04-07/#SECURITY-1721'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/07... | {'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:50:02Z', 'nvd_published_at': '2021-04-07T14:15:00Z'} |
1.4.0 | GHSA-x3p3-929j-pq66 | 2022-07-06T20:10:02Z | 2022-05-17T03:53:41Z | null | ['CVE-2015-7536'] | Improper Neutralization of Input During Web Page Generation in Jenkins | Cross-site scripting (XSS) vulnerability in Jenkins before 1.640 and LTS before 1.625.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors related to workspaces and archived artifacts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.640'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7536'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-12-09'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:10:02Z', 'nvd_published_at': '2016-02-03T18:59:00Z'} |
1.4.0 | GHSA-59h8-h34r-q9cv | 2022-11-22T19:22:34Z | 2022-05-24T16:59:50Z | null | ['CVE-2019-18393'] | Ignite Realtime Openfire directory traversal vulnerability | PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability. Version 4.5.0-beta contains a fix for the issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0-beta'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18393'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/pull/1498'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/commit/cb900749d4e836b32cc6e2cc41cda17f252b977d'}, {'type': 'WEB', 'url': 'https://swarm.pts... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:22:34Z', 'nvd_published_at': '2019-10-24T11:15:00Z'} |
1.4.0 | GHSA-7ghm-rpc7-p7g5 | 2022-11-03T23:44:50Z | 2022-05-13T01:16:08Z | null | ['CVE-2013-2115'] | Code injection in Apache Struts | A vulnerability introduced by forcing parameter inclusion in the URL and Anchor Tag allows remote command execution, session access and manipulation and XSS attacks.
both the s:url and s:a tag provide an includeParams attribute.
The main scope of that attribute is to understand whether includes http request parameter... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.14.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2115'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=967656'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-013'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-014'}, ... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:44:50Z', 'nvd_published_at': '2013-07-10T19:55:00Z'} |
1.4.0 | GHSA-r9fv-qpm9-rj4g | 2022-06-28T23:46:58Z | 2022-05-13T01:27:27Z | null | ['CVE-2018-3831'] | Exposure of Sensitive Information to an Unauthorized Actor in Elasticsearch | Elasticsearch Alerting and Monitoring in versions before 6.4.1 or 5.6.12 have an information disclosure issue when secrets are configured via the API. The Elasticsearch _cluster/settings API, when queried, could leak sensitive configuration information such as passwords, tokens, or usernames. This could allow an authen... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.6.0'}, {'fixed': '5.6.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3831'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-6-4-1-and-5-6-12-security-update/149035'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:46:58Z', 'nvd_published_at': '2018-09-19T19:29:00Z'} |
1.4.0 | GHSA-589q-75r3-mfq4 | 2023-07-20T11:13:08Z | 2022-05-24T17:23:41Z | null | ['CVE-2020-6165'] | Silverstripe has Incorrect Default Permissions | SilverStripe 4.5.0 allows attackers to read certain records that should not have been placed into a result set. This affects silverstripe/recipe-cms. The automatic permission-checking mechanism in the silverstripe/graphql module does not provide complete protection against lists that are limited (e.g., through paginati... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/recipe-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6165'}, {'type': 'WEB', 'url': 'https://docs.silverstripe.org/en/4/changelogs/4.5.3/?_ga=2.170693920.105499209.1689776417-708940272.1689776417'}, {'type': 'WEB', 'url': 'https://docs.silverstripe.org/en/4/changelogs/4.6.0/?_ga=2.170693920.105499209... | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T11:13:08Z', 'nvd_published_at': '2020-07-15T21:15:00Z'} |
1.4.0 | GHSA-vmfx-gcfq-wvm2 | 2023-07-10T13:05:32Z | 2022-05-24T17:03:17Z | null | ['CVE-2019-5815'] | Nokogiri implementation of libxslt vulnerable to heap corruption | Type confusion in `xsltNumberFormatGetMultipleLevel` prior to libxslt 1.1.33 could allow attackers to potentially exploit heap corruption via crafted XML data.
Nokogiri prior to version 1.10.5 contains a vulnerable version of libxslt. Nokogiri version 1.10.5 upgrades the dependency to libxslt 1.1.34, which contains a ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5815'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/2630'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-5815.yml'}, {'type': 'PACKAGE', 'url': 'https://github.c... | {'cwe_ids': ['CWE-787', 'CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T21:30:28Z', 'nvd_published_at': '2019-12-11T01:15:00Z'} |
1.4.0 | GHSA-q46v-cj5v-hvg6 | 2022-07-13T15:47:55Z | 2022-05-17T00:22:31Z | null | ['CVE-2012-4449'] | Use of a Broken or Risky Cryptographic Algorithm in Apache Hadoop | Apache Hadoop before 0.23.4, 1.x before 1.0.4, and 2.x before 2.0.2 generate token passwords using a 20-bit secret when Kerberos security features are enabled, which makes it easier for context-dependent attackers to crack secret keys via a brute-force attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4449'}, {'type': 'WEB', 'url': 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html#topic_1_0'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/hadoop-general/201210.mbox/%3CCA+z3+9FYdPmzBEaMZ71... | {'cwe_ids': ['CWE-327'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:47:55Z', 'nvd_published_at': '2017-10-30T19:29:00Z'} |
1.4.0 | GHSA-hc39-rjwp-qffq | 2023-09-22T21:05:33Z | 2022-05-01T18:03:36Z | null | ['CVE-2007-2449'] | Apache Tomcat XSS Vulnerabilities in Examples Web Application | Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the U... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'last_affected': '4.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-2449'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/34869'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'typ... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:05:33Z', 'nvd_published_at': '2007-06-14T23:30:00Z'} |
1.4.0 | GHSA-6429-3g3w-6mw5 | 2022-05-24T20:58:02Z | 2022-05-07T00:00:31Z | null | ['CVE-2022-25324'] | Uncaught Exception in bignum | All versions of the npm package bignum are vulnerable to Denial of Service (DoS) due to a type-check exception in V8. When verifying the type of the second argument to the .powm function, V8 will crash regardless of Node try/catch blocks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'bignum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25324'}, {'type': 'PACKAGE', 'url': 'https://github.com/justmoon/node-bignum'}, {'type': 'WEB', 'url': 'https://github.com/justmoon/node-bignum/blob/ef2e02533e598d6df8421000033c4753cde89ee2/index.js#L111'}, {'type': 'WEB', 'url': 'https://snyk.io/v... | {'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T20:58:02Z', 'nvd_published_at': '2022-05-06T20:15:00Z'} |
1.4.0 | GHSA-788w-269g-j92q | 2023-07-21T20:33:53Z | 2022-05-13T01:20:52Z | null | ['CVE-2018-8391'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8354, CVE-2018-8456, CVE-2018-8457, CVE-2018-8459. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8391'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8391'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210419154033/http://www.securityfocus.com/bid/105231'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:33:53Z', 'nvd_published_at': '2018-09-13T00:29:00Z'} |
1.4.0 | GHSA-q4h5-g3w8-f9x7 | 2023-07-26T19:53:36Z | 2022-05-14T01:22:02Z | null | ['CVE-2017-6068'] | Subrion CMS CSRF Vulnerability | Subrion CMS 4.0.5 has CSRF in `admin/blocks/add/`. The attacker can create any block, and can optionally insert XSS via the content parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-6068'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210126223835/http://www.securityfocus.com/bid/97091'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T19:53:36Z', 'nvd_published_at': '2017-03-27T02:59:00Z'} |
1.4.0 | GHSA-7h24-4x4c-69mf | 2022-11-03T23:46:33Z | 2022-05-24T17:03:49Z | null | ['CVE-2019-16576'] | Improper Authorization in Jenkins Alauda Kubernetes Suport Plugin | A missing permission check in Jenkins Alauda Kubernetes Suport Plugin 2.3.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing the Kubernetes service account token or credentials stored in ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.alauda.jenkins.plugins:alauda-kubernetes-support'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16576'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1602'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}] | {'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:46:33Z', 'nvd_published_at': '2019-12-17T15:15:00Z'} |
1.4.0 | GHSA-69vh-662j-v988 | 2023-07-31T18:54:23Z | 2022-05-14T02:46:11Z | null | ['CVE-2016-7137'] | Plone Open Redirect Vulnerability | Multiple open redirect vulnerabilities in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the referer parameter to (1) `%2b%2bgroupdashboard%2b%2bplone.dashboard1%2bgroup/%2b/portlets.Actio... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'last_affected': '5.0.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'last_affected': '4.3.11'}]}]}, {'package': {'ec... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7137'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20160830/open-redirection-in-plone'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210625091607/http://www.securityfocus.com/bid/92752'}, {'type': 'WEB', 'url': 'https://web... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:54:23Z', 'nvd_published_at': '2017-03-07T16:59:00Z'} |
1.4.0 | GHSA-5h2q-4hrp-v9rr | 2023-04-21T20:17:54Z | 2022-05-17T05:12:01Z | null | ['CVE-2012-3444'] | Django vulnerable to Improper Restriction of Operations within the Bounds of a Memory Buffer | The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3444'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/da33d67181b53fe6cc737ac1220153814a1509f6'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:17:54Z', 'nvd_published_at': '2012-07-31T17:55:00Z'} |
1.4.0 | GHSA-5xv9-gp22-gqm5 | 2022-12-21T18:50:13Z | 2022-05-24T17:30:19Z | null | ['CVE-2020-2294'] | Missing permission checks in Jenkins Maven Cascade Release Plugin | Jenkins Maven Cascade Release Plugin 1.3.2 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to start cascade builds and layout builds, and reconfigure the plugin. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.barchart.jenkins:maven-release-cascade'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2294'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/maven-release-cascade-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2049'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:50:13Z', 'nvd_published_at': '2020-10-08T13:15:00Z'} |
1.4.0 | GHSA-3q84-vrvx-rfvf | 2022-12-16T20:24:54Z | 2022-05-24T19:19:44Z | null | ['CVE-2021-21687'] | Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins | The agent-to-controller security subsystem limits which files on the Jenkins controller can be accessed by agent processes.
Multiple vulnerabilities in the file path filtering implementation of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allow agent processes to read and write arbitrary files on the Jenkins con... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.303.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.303.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21687'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455'}] | {'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:48:59Z', 'nvd_published_at': '2021-11-04T17:15:00Z'} |
1.4.0 | GHSA-73xj-v6gc-g5p5 | 2023-08-29T19:32:42Z | 2022-05-13T01:10:00Z | null | ['CVE-2018-19422'] | Subrion CMS RCE Vulnerability | `/panel/uploads` in Subrion CMS 4.2.1 allows remote attackers to execute arbitrary PHP code via a .pht or .phar file, because the .htaccess file omits these. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19422'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/801'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/commit/74359bcfaea424edda6d782a8ac25397c55972ab'}, {'type': 'WEB', 'url': 'http://packetstormsecuri... | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:32:42Z', 'nvd_published_at': '2018-11-21T21:29:00Z'} |
1.4.0 | GHSA-3h7v-wqw7-ff28 | 2022-06-03T15:48:44Z | 2022-05-24T22:28:08Z | null | ['CVE-2021-25975'] | Cross site scripting in publify | In publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS as a result of an unrestricted file upload. This issue allows a user with “publisher” role to inject malicious JavaScript via the uploaded html file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0'}, {'fixed': '9.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25975'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/d99c0870d3dbbfde7febdc6cad33199b84770101'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vul... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:48:44Z', 'nvd_published_at': '2021-11-10T11:15:00Z'} |
1.4.0 | GHSA-3295-h9qx-r82x | 2022-07-08T18:48:11Z | 2022-05-14T02:43:11Z | null | ['CVE-2010-3700'] | Authentication Bypass Using an Alternate Path or Channel in SpringSource Spring Security and Acegi Security | VMware SpringSource Spring Security 2.x before 2.0.6 and 3.x before 3.0.4, and Acegi Security 1.0.0 through 1.0.7, as used in IBM WebSphere Application Server (WAS) 6.1 and 7.0, allows remote attackers to bypass security constraints via a path parameter. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM',... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3700'}, {'type': 'WEB', 'url': 'https://issues.apache.org/bugzilla/show_bug.cgi?id=25015'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20110802082343/http://www.springsource.com/security/cve-2010-3700'}] | {'cwe_ids': ['CWE-288'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:48:11Z', 'nvd_published_at': '2010-10-29T19:00:00Z'} |
1.4.0 | GHSA-v9v9-xffq-rwr4 | 2022-07-06T19:51:12Z | 2022-05-17T02:57:58Z | null | ['CVE-2016-9909'] | Improper Neutralization of Input During Web Page Generation in html5lib | The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cross-site scripting (XSS) attacks by leveraging mishandling of the < (less than) character in attribute values. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'html5lib'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.999999999'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9909'}, {'type': 'WEB', 'url': 'https://github.com/html5lib/html5lib-python/issues/11'}, {'type': 'WEB', 'url': 'https://github.com/html5lib/html5lib-python/issues/12'}, {'type': 'WEB', 'url': 'https://github.com/html5lib/html5lib-python/commit/9b8... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:51:12Z', 'nvd_published_at': '2017-02-22T16:59:00Z'} |
1.4.0 | GHSA-7h48-m3rw-vr27 | 2023-01-27T00:01:51Z | 2022-05-17T05:31:08Z | null | ['CVE-2008-7310'] | Spree does not properly restrict the use of a hash to provide values for a model's attributes | Spree 0.2.0 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the Order state value and bypass the intended payment step via a modified URL, related to a "mass assignment" vulnerability. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-7310'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2008-7310.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree'}, {'type': 'WEB', 'url': 'https://spreecommerce.com/blog/security-vu... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:01:51Z', 'nvd_published_at': '2012-04-05T13:25:00Z'} |
1.4.0 | GHSA-x4cf-6jr3-3qvp | 2022-06-27T17:02:32Z | 2022-05-24T17:32:10Z | null | ['CVE-2020-1915'] | Out-of-bounds Read in Facebook Hermes | An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits ev... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hermes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1915'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/issues/373'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/commit/8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/h... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:00:13Z', 'nvd_published_at': '2020-10-26T21:15:00Z'} |
1.4.0 | GHSA-4c39-hj99-5h2r | 2023-07-31T23:46:20Z | 2022-05-13T01:12:09Z | null | ['CVE-2015-6926'] | OXID eShop user impersonation vulnerability | The OpenID Single Sign-On authentication functionality in OXID eShop before 4.5.0 allows remote attackers to impersonate users via the email address in a crafted authentication token. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'oxid-esales/oxideshop-ce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-6926'}, {'type': 'WEB', 'url': 'https://bugs.oxid-esales.com/view.php?id=6224'}, {'type': 'WEB', 'url': 'https://oxidforge.org/en/oxid-security-bulletin-2015-001.html'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T23:46:20Z', 'nvd_published_at': '2018-01-19T15:29:00Z'} |
1.4.0 | GHSA-wpmr-q825-x4c6 | 2023-08-07T19:59:14Z | 2022-05-24T17:32:47Z | null | ['CVE-2020-15703'] | aptdaemon Information Disclosure via Improper Input Validation in Transaction class | There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check f... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'aptdaemon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15703'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ubuntu/+source/aptdaemon/+bug/1888235'}, {'type': 'PACKAGE', 'url': 'https://github.com/linuxmint/aptdaemon'}, {'type': 'WEB', 'url': 'https://github.com/linuxmint/aptdaemon/blob/4d24cb615... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T19:59:14Z', 'nvd_published_at': '2020-10-31T04:15:00Z'} |
1.4.0 | GHSA-q3cj-2r34-2cwc | 2022-06-17T21:29:04Z | 2022-05-17T02:51:56Z | null | ['CVE-2016-9243'] | Improper input validation in cryptography | HKDF in cryptography before 1.5.3 returns an empty byte-string if used with a length less than algorithm.digest_size. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9243'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/issues/3211'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874'}, {'type': 'WEB', 'url': 'https://cryptography.io/en/l... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:29:04Z', 'nvd_published_at': '2017-03-27T17:59:00Z'} |
1.4.0 | GHSA-47h6-hfpv-7phj | 2023-08-01T22:37:20Z | 2022-05-24T17:00:29Z | null | ['CVE-2019-8159'] | Magento 2 Community Edition RCE Vulnerability | A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with system data manipulation privileges can execute aribitrary code through arbitrary file deletion and OS command injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8159'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:37:20Z', 'nvd_published_at': '2019-11-06T00:15:00Z'} |
1.4.0 | GHSA-mgfr-44wv-hqv6 | 2023-09-25T19:12:43Z | 2022-05-24T16:52:28Z | null | ['CVE-2019-7938'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to modify catalog p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7938'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:09:44Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-369m-2gv6-mw28 | 2023-07-27T14:58:44Z | 2022-05-14T02:03:29Z | null | ['CVE-2017-10784'] | WEBrick RCE Vulnerability | The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'webrick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-10784'}, {'type': 'WEB', 'url': 'https://github.com/ruby/ruby/commit/6617c41292'}, {'type': 'WEB', 'url': 'https://github.com/ruby/webrick/commit/4ac0f3843ab82d1c31e1cfc719409208adef7813'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/2233... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T20:26:17Z', 'nvd_published_at': '2017-09-19T17:29:00Z'} |
1.4.0 | GHSA-9pf8-qqhm-7w64 | 2022-06-30T14:03:27Z | 2022-05-13T01:30:17Z | null | ['CVE-2018-10054'] | Improper Input Validation in Datomic | H2 1.4.197, as used in Datomic before 0.9.5697 and other products, allows remote code execution because CREATE ALIAS can execute arbitrary Java code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.datomic:datomic-free'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5697'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.5656'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10054'}, {'type': 'WEB', 'url': 'https://forum.datomic.com/t/important-security-update-0-9-5697/379'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/582d4165de6507b0be82d5a6f9a1ce392ec43a00c9fed32bacf7fe1e@%3Cuser.ignite.apache.org%3... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T14:03:27Z', 'nvd_published_at': '2018-04-11T20:29:00Z'} |
1.4.0 | GHSA-w9gq-8q35-3jcc | 2022-12-07T18:15:59Z | 2022-05-13T01:48:32Z | null | ['CVE-2018-1000111'] | Jenkins Subversion Plugin Incorrect Authorization vulnerability | An improper authorization vulnerability exists in Jenkins Subversion Plugin version 2.10.2 and earlier in `SubversionStatus.java` and `SubversionRepositoryStatus.java` that allows an attacker with network access to obtain a list of nodes and users. As of version 2.10.3, the class handling requests to /subversion/ no lo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000111'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-02-26/#SECURITY-724'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T18:15:59Z', 'nvd_published_at': '2018-03-13T13:29:00Z'} |
1.4.0 | GHSA-g66q-grxc-64j3 | 2022-06-29T22:50:12Z | 2022-05-14T03:10:57Z | null | ['CVE-2018-12432'] | Cross-site Scripting in JavaMelody | JavaMelody through 1.60.0 has XSS via the counter parameter in a clear_counter action to the /monitoring URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.bull.javamelody:javamelody-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.61.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.60.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12432'}, {'type': 'WEB', 'url': 'https://github.com/javamelody/javamelody/commit/e0497c1980acebd257d3da78dfde29ae9bdffdf6'}, {'type': 'WEB', 'url': 'https://github.com/Hurdano/JavaMelody-XSS/wiki/Attack-Vector---JavaMelody'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:50:12Z', 'nvd_published_at': '2018-06-14T23:29:00Z'} |
1.4.0 | GHSA-7g54-vgp6-jj5w | 2022-11-03T20:48:21Z | 2022-05-17T02:26:22Z | null | ['CVE-2016-6798'] | XML External Entity Reference in Apache Sling | In the XSS Protection API module before 1.0.12 in Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to validate the input string, which allows for XXE attacks in all scripts which use this method to validate user input, potentially allowing an attacker to read sensitive data on the filesystem, perf... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.xss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6798'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b72c3a511592ec70729b3ec2d29302b6ce87bbeab62d4745617a6bd0@%3Cdev.sling.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99873'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T20:48:21Z', 'nvd_published_at': '2017-07-19T15:29:00Z'} |
1.4.0 | GHSA-v9gf-98vr-mgp2 | 2023-08-01T19:56:41Z | 2022-05-13T01:08:49Z | null | ['CVE-2015-5640'] | baserCMS Access Control Bypass | baserCMS before 3.0.8 allows remote authenticated users to modify arbitrary user settings via a crafted request. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5640'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}, {'type': 'WEB', 'url': 'http://basercms.net/security/JVN04855224'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN04855224/index.html'}, {'type': 'WEB', 'url': 'http:/... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:56:41Z', 'nvd_published_at': '2015-10-06T01:59:00Z'} |
1.4.0 | GHSA-g888-g2pp-82hf | 2023-07-25T20:55:06Z | 2022-05-14T03:34:12Z | null | ['CVE-2018-7711'] | SimpleSAMLphp saml2 incorrect signature validation | HTTPRedirect.php in the saml2 library in SimpleSAMLphp before 1.15.4 has an incorrect check of return values in the signature validation utilities, allowing an attacker to get invalid signatures accepted as valid by forcing an error during validation. This occurs because of a dependency on PHP functionality that interp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7711'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/saml2/commit/4f6af7f69f29df8555a18b9bb7b646906b45924d'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/03/msg00017.html'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T20:55:06Z', 'nvd_published_at': '2018-03-05T22:29:00Z'} |
1.4.0 | GHSA-g34c-mg6m-xvxj | 2023-02-06T20:08:53Z | 2022-05-17T05:27:39Z | null | ['CVE-2012-2395'] | Cobbler subject to Command Injection | A Command Injection in action_power.py in Cobbler prior to v2.6.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) username or (2) password fields to the power_system method in the xmlrpc API. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2395'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/issues/141'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/6d9167e5da44eca56bdf42b5776097a6779aaadf'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ubuntu... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T20:08:52Z', 'nvd_published_at': '2012-06-16T00:55:00Z'} |
1.4.0 | GHSA-cr9c-rhq6-vh53 | 2022-05-25T20:13:42Z | 2022-05-17T00:01:44Z | null | ['CVE-2022-29351'] | Code execution via SVG file upload in tiddlywiki | An arbitrary file upload vulnerability in the file upload module of Tiddlywiki5 v5.2.2 allows attackers to execute arbitrary code via a crafted SVG file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'tiddlywiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29351'}, {'type': 'PACKAGE', 'url': 'https://github.com/Jermolene/TiddlyWiki5'}, {'type': 'WEB', 'url': 'https://github.com/jimcola99/corruptsvgfile'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=F_DBx4psWns'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:13:42Z', 'nvd_published_at': '2022-05-16T14:15:00Z'} |
1.4.0 | GHSA-w66p-78g4-mr7g | 2023-08-15T19:35:52Z | 2022-05-17T01:39:21Z | null | ['CVE-2012-5563'] | OpenStack Keystone Insufficient token expiration | OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5563'}, {'type': 'WEB', 'url': 'https://github.com/openstack/keystone/commit/38c7e46a640a94da4da89a39a5a1ea9c081f1eb5'}, {'type': 'WEB', 'url': 'https://github.com/openstack/keystone/commit/f9d4766249a72d8f88d75dcf1575b28dd3496681'}, {'type': 'WEB'... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:53:23Z', 'nvd_published_at': '2012-12-18T01:55:00Z'} |
1.4.0 | GHSA-89rq-27xp-vgv7 | 2023-08-29T18:25:00Z | 2022-05-17T04:49:45Z | null | ['CVE-2013-4190'] | Plone Multiple cross-site scripting (XSS) vulnerabilities | Multiple cross-site scripting (XSS) vulnerabilities in (1) spamProtect.py, (2) pts.py, and (3) request.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'e... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4190'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978451'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:25:00Z', 'nvd_published_at': '2014-03-11T19:37:00Z'} |
1.4.0 | GHSA-qg25-hgjv-cg9q | 2022-07-06T20:16:53Z | 2022-05-13T01:25:41Z | null | ['CVE-2015-3253'] | Improper Neutralization of Special Elements in Output Used by a Downstream Component in Apache Groovy | The MethodClosure class in runtime/MethodClosure.java in Apache Groovy 1.7.0 through 2.4.3 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted serialized object. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.groovy:groovy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '2.4.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3253'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1376'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2486'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2596'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:16:53Z', 'nvd_published_at': '2015-08-13T14:59:00Z'} |
1.4.0 | GHSA-6xxc-4jc4-7jv3 | 2023-08-09T13:17:26Z | 2022-05-24T22:28:20Z | null | ['CVE-2021-33330'] | Exposure of Resource to Wrong Sphere in Liferay Portal | Liferay Portal 7.2.0 through 7.3.2, and Liferay DXP 7.2 before fix pack 9, allows access to Cross-origin resource sharing (CORS) protected resources if the user is only authenticated using the portal session authentication, which allows remote attackers to obtain sensitive information including the targeted user’s emai... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.2.0'}, {'fixed': '7.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33330'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17127'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/120747720'}] | {'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:17:26Z', 'nvd_published_at': '2021-08-03T19:15:00Z'} |
1.4.0 | GHSA-rx4j-x3fh-9qwg | 2023-09-25T19:36:16Z | 2022-05-24T16:58:02Z | null | ['CVE-2019-17106'] | Centreon Sensitive Data Exposure | In Centreon Web through 2.8.29, disclosure of external components' passwords allows authenticated attackers to move laterally to external components. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.29'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17106'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/issues/7098'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/9311'}, {'type': 'PACKAGE', 'url': 'https://github.com/centreon/centreon-archiv... | {'cwe_ids': ['CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T22:12:18Z', 'nvd_published_at': '2019-10-08T13:15:00Z'} |
1.4.0 | GHSA-5xm4-jmpw-p6j3 | 2023-08-16T21:59:13Z | 2022-05-17T19:57:32Z | null | ['CVE-2014-4660'] | Ansible discloses credential information | Ansible before 1.5.5 constructs filenames containing user and password fields on the basis of deb lines in `sources.list`, which might allow local users to obtain sensitive credential information in opportunistic circumstances by leveraging existence of a file that uses the `deb http://user:pass@server:port/` format. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4660'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/c4b5e46054c74176b2446c82d4df1a2610eddc08'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://secur... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:59:13Z', 'nvd_published_at': '2020-02-20T03:15:00Z'} |
1.4.0 | GHSA-3p5r-7cw3-2m67 | 2022-07-08T19:07:33Z | 2022-05-17T02:44:28Z | null | ['CVE-2013-2071'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat | java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circ... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.40'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2071'}, {'type': 'WEB', 'url': 'https://issues.apache.org/bugzilla/show_bug.cgi?id=54178'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail... | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:07:33Z', 'nvd_published_at': '2013-06-01T14:21:00Z'} |
1.4.0 | GHSA-fx92-wh72-8g9q | 2022-11-04T18:43:41Z | 2022-05-17T01:17:12Z | null | ['CVE-2017-3154'] | Apache Atlas produces Stack trace in error response | Error responses from Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating included stack trace, exposing excessive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:atlas-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1-incubating'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3154'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/atlas'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4a4fef91e067fd0d9da569e30867c1fa65e2a0520acde71ddefee0ea@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'http:... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:43:41Z', 'nvd_published_at': '2017-08-29T20:29:00Z'} |
1.4.0 | GHSA-v98h-rv7j-hf6j | 2022-12-06T21:58:48Z | 2022-05-24T17:01:41Z | null | ['CVE-2019-16547'] | Jenkins Google Compute Engine Plugin Missing Authorization vulnerability | Missing permission checks in various API endpoints in Jenkins Google Compute Engine Plugin 4.1.1 and earlier allow attackers with Overall/Read permission to obtain limited information about the plugin configuration and environment. Google Compute Engine Plugin 4.2.0 requires the appropriate Job/Configure permission to ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-compute-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16547'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1585'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/11/21/1'}] | {'cwe_ids': ['CWE-285', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:58:48Z', 'nvd_published_at': '2019-11-21T15:15:00Z'} |
1.4.0 | GHSA-9772-cwx9-r4cj | 2022-07-27T21:35:21Z | 2022-05-14T02:05:09Z | null | ['CVE-2014-4616'] | simplejson before 2.6.1 vulnerable to array index error | Array index error in the scanstring function in the _json module in Python 2.7 through 3.5 and simplejson before 2.6.1 allows context-dependent attackers to read arbitrary process memory via a negative index value in the idx argument to the raw_decode function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'simplejson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4616'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/12297'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752395'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1112285'}, {'type': 'PACK... | {'cwe_ids': ['CWE-129'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T21:35:21Z', 'nvd_published_at': '2017-08-24T20:29:00Z'} |
1.4.0 | GHSA-chqf-hx79-gxc6 | 2022-07-26T17:09:08Z | 2022-05-17T02:58:54Z | null | ['CVE-2017-5992'] | Improper Restriction of XML External Entity Reference in Openpyxl | Openpyxl 2.4.1 resolves external entities by default, which allows remote attackers to conduct XXE attacks via a crafted .xlsx document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'openpyxl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5992'}, {'type': 'WEB', 'url': 'https://bitbucket.org/openpyxl/openpyxl/commits/3b4905f428e1'}, {'type': 'WEB', 'url': 'https://bitbucket.org/openpyxl/openpyxl/issues/749'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T11:49:57Z', 'nvd_published_at': '2017-02-15T19:59:00Z'} |
1.4.0 | GHSA-66x7-2r56-fj77 | 2023-09-28T20:40:46Z | 2022-05-14T01:36:13Z | null | ['CVE-2019-7313'] | Buildbot CRLF Injection | `www/resource.py` in Buildbot before 1.8.1 allows CRLF injection in the Location header of `/auth/login` and `/auth/logout` via the redirect parameter. This affects other web sites in the same domain. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'buildbot'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7313'}, {'type': 'WEB', 'url': 'https://github.com/buildbot/buildbot/pull/4584'}, {'type': 'WEB', 'url': 'https://github.com/buildbot/buildbot/commit/e781f110933e05ecdb30abc64327a2c7c9ff9c5a'}, {'type': 'PACKAGE', 'url': 'https://github.com/buildbo... | {'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:17:46Z', 'nvd_published_at': '2019-02-03T08:29:00Z'} |
1.4.0 | GHSA-4qrj-99r6-jfrh | 2022-12-29T01:29:38Z | 2022-05-24T17:28:24Z | null | ['CVE-2020-2253'] | Missing hostname validation in Email Extension Plugin | Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections.
Email Extension Plugin 2.76 validates the SMTP hostname when connecting via TLS by default... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.76'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.75'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2253'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/email-ext-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1851'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:29:38Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-5wm2-38q5-5rxv | 2023-09-25T14:35:32Z | 2022-05-14T00:56:24Z | null | ['CVE-2014-2683'] | Several Zend Products Vulnerable to XXE and XEE attacks | Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and 2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler, ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and ZendService_Api before 1.0.0... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework1'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendopenid'}, 'ecosystem_specific':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2683'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140419041226/http://www.securityfocus.com/bid/66358'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150523055201/http://www.mandriva.com/en/support/security/advisories/advisory/... | {'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-25T14:35:32Z', 'nvd_published_at': '2014-11-16T00:59:00Z'} |
1.4.0 | GHSA-wr5c-4f2h-28m6 | 2023-09-28T20:45:29Z | 2022-05-14T01:38:22Z | null | ['CVE-2019-7169'] | Croogo vulnerable to XSS in title field | A stored self-XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to `/admin/menus/menus/edit/3`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7169'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/issues/888'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/commit/cafaaabe2cef3d1d83652370e30563e6ad7c4158'}, {'type': 'PACKAGE', 'url': 'https://github.com/croogo/croogo'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:25:27Z', 'nvd_published_at': '2019-01-29T18:29:00Z'} |
1.4.0 | GHSA-6m8r-jh89-rq7h | 2023-08-03T18:49:13Z | 2022-05-24T17:43:45Z | null | ['CVE-2021-25313'] | Rancher Cross-site Scripting Vulnerability | A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rancher allows remote attackers to execute JavaScript via malicious links. This issue affects: SUSE Rancher Rancher versions prior to 2.5.6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25313'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/issues/31583'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1181852'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/releases/tag/v2.3.11'}, {'ty... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T23:48:08Z', 'nvd_published_at': '2021-03-05T09:15:00Z'} |
1.4.0 | GHSA-x3pr-fcgm-wjgc | 2022-07-27T20:55:20Z | 2022-05-24T17:08:46Z | null | ['CVE-2020-2111'] | Subversion Plugin stored XSS vulnerability before v2.13.1 | Jenkins Subversion Plugin 2.13.0 and earlier does not escape the error message for the Project Repository Base URL field form validation, resulting in a stored cross-site scripting vulnerability. Subversion Plugin 2.13.1 escapes the affected part of the error message. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2111'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1725'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T20:55:20Z', 'nvd_published_at': '2020-02-12T15:15:00Z'} |
1.4.0 | GHSA-q6rq-4whr-r879 | 2022-12-21T19:25:23Z | 2022-05-24T17:33:07Z | null | ['CVE-2020-2302'] | Missing permission check in Jenkins Active Directory Plugin allows accessing domain health check page | Active Directory Plugin 2.19 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to access the domain health check diagnostic page.
Active Directory Plugin 2.20 requires Overall/Administer permission to access the domain health check diagnostic page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:active-directory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2302'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/active-directory-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-1999'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T19:25:23Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-f5h9-3hpf-9j8m | 2023-08-29T18:27:20Z | 2022-05-17T04:49:45Z | null | ['CVE-2013-4192'] | Plone is vulnerable to email spoofing | sendto.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote authenticated users to spoof emails via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'e... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4192'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978464'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:27:20Z', 'nvd_published_at': '2014-03-11T19:37:00Z'} |
1.4.0 | GHSA-hr65-qq6p-87r4 | 2022-06-22T18:23:44Z | 2022-05-24T19:02:19Z | null | ['CVE-2021-22137'] | Exposure of Sensitive Information to an Unauthorized Actor in Elasticsearch | In Elasticsearch versions before 7.11.2 and 6.8.15 a document disclosure flaw was found when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain cross-cluster search queries. This could result in the search disclosing the existence of documents t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.11.0'}, {'fixed': '7.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.11.1'}}, {'package': {'ecosys... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22137'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125'}, {'type': 'PACKAGE', 'url': 'https://github.com/elastic/elasticsearch'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advi... | {'cwe_ids': ['CWE-200', 'CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:23:44Z', 'nvd_published_at': '2021-05-13T18:15:00Z'} |
1.4.0 | GHSA-3p8r-p4q5-mc44 | 2023-02-23T20:31:42Z | 2022-05-24T16:56:46Z | null | ['CVE-2019-10416'] | Violation Comments to GitLab Plugin has Insufficiently Protected Credentials | Violation Comments to GitLab Plugin stored API tokens unencrypted in job `config.xml` files and its global configuration file `org.jenkinsci.plugins.jvctgl.ViolationsToGitLabGlobalConfiguration.xml` on the Jenkins controller. These credentials could be viewed by users with Extended Read permission, or access to the Jen... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:violation-comments-to-gitlab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.29'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10416'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1577'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}] | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T20:31:42Z', 'nvd_published_at': '2019-09-25T16:15:00Z'} |
1.4.0 | GHSA-wfpw-hqjg-58ph | 2022-12-21T18:50:46Z | 2022-05-24T17:30:19Z | null | ['CVE-2020-2295'] | CSRF vulnerability in Jenkins Maven Cascade Release Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Maven Cascade Release Plugin 1.3.2 and earlier allows attackers to start cascade builds and layout builds, and reconfigure the plugin. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.barchart.jenkins:maven-release-cascade'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2295'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/maven-release-cascade-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2049'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:50:46Z', 'nvd_published_at': '2020-10-08T13:15:00Z'} |
1.4.0 | GHSA-qw28-g63m-jxqv | 2022-09-09T00:51:51Z | 2022-05-24T16:43:54Z | null | ['CVE-2019-10306'] | Sandbox bypass in ontrack Jenkins Plugin | A sandbox bypass vulnerability in Jenkins ontrack Plugin 3.4 and earlier allowed attackers with control over ontrack DSL definitions to execute arbitrary code on the Jenkins master JVM. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ontrack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10306'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ontrack-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-04-17/#SECURITY-1341'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108045'}] | {'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-09T00:51:51Z', 'nvd_published_at': '2019-04-18T17:29:00Z'} |
1.4.0 | GHSA-ccwp-633j-g29v | 2022-12-20T22:10:51Z | 2022-05-24T17:27:07Z | null | ['CVE-2020-2250'] | Passwords stored in plain text by Jenkins ReadyAPI Functional Testing Plugin | ReadyAPI Functional Testing Plugin 1.3 and earlier stores project passwords unencrypted in job `config.xml` files as part of its configuration. These project passwords can be viewed by attackers with Extended Read permission or access to the Jenkins controller file system.
ReadyAPI Functional Testing Plugin 1.4 stores... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:soapui-pro-functional-testing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2250'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/soapui-pro-functional-testing-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com... | {'cwe_ids': ['CWE-256'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:10:51Z', 'nvd_published_at': '2020-09-01T14:15:00Z'} |
1.4.0 | GHSA-jgm2-m5cg-f66g | 2022-07-13T21:29:14Z | 2022-05-17T00:59:04Z | null | ['CVE-2012-3546'] | Authentication Bypass in Apache Tomcat | org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.36'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3546'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/f78c0cdfc8a3c2efdfe6df6b69e5e3daafa3f588'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://oval.cisecurity.org/repository/searc... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T21:29:14Z', 'nvd_published_at': '2012-12-19T11:55:00Z'} |
1.4.0 | GHSA-6mv9-hcx5-7mhh | 2022-06-30T19:43:25Z | 2022-05-13T01:01:03Z | null | ['CVE-2018-1000067'] | Server-Side Request Forgery in Jenkins | An improper authorization vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to have Jenkins submit HTTP GET requests and get limited information about the response. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.89.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.89.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000067'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/2d16b459205730d85e51499c2457109b234ca9d9'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advis... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T19:43:25Z', 'nvd_published_at': '2018-02-16T00:29:00Z'} |
1.4.0 | GHSA-8mvw-22r7-w6fq | 2023-03-08T19:28:01Z | 2022-05-05T02:48:30Z | null | ['CVE-2013-0162'] | ruby_parser allows local users to overwrite arbitrary files via symlink attack on temporary file with predictable name | The `diff_pp` function in `lib/gauntlet_rubyparser.rb` in the ruby_parser gem 3.1.1 and earlier for Ruby allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in `/tmp`. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ruby_parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.2'}, {'fixed': '3.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0162'}, {'type': 'WEB', 'url': 'https://github.com/seattlerb/ruby_parser/commit/506c7e13cff6f8715385fa8488b621028b4ad280'}, {'type': 'WEB', 'url': 'https://github.com/seattlerb/ruby_parser/commit/c35acd878d50a8e4ea35933e3fbdc493421d422c'}, {'type':... | {'cwe_ids': ['CWE-377'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T19:28:01Z', 'nvd_published_at': '2013-03-01T05:40:00Z'} |
1.4.0 | GHSA-w37f-pvvx-wcwm | 2022-06-02T14:50:29Z | 2022-05-19T00:00:16Z | null | ['CVE-2022-30600'] | Incorrect Calculation in moodle | A flaw was found in moodle where logic used to count failed login attempts could result in the account lockout threshold being bypassed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30600'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/59b5858da200f63ecb59a9113af2b99ef1496fe5'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2083613'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodl... | {'cwe_ids': ['CWE-682'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T14:50:29Z', 'nvd_published_at': '2022-05-18T18:15:00Z'} |
1.4.0 | GHSA-qff8-g48j-pwpw | 2023-09-22T21:05:30Z | 2022-05-01T18:13:14Z | null | ['CVE-2007-3382'] | Apache Tomcat treats single quotes as delimiters in cookies | Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (`'`) as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'last_affected': '6.0.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-3382'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/36006'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E'}, {'typ... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:05:30Z', 'nvd_published_at': '2007-08-14T22:17:00Z'} |
1.4.0 | GHSA-c6mx-gwgr-mfm2 | 2023-07-21T18:40:44Z | 2022-05-13T01:18:42Z | null | ['CVE-2018-0995'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0995'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/396d78f60a3d8444218253523365965f97942225'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0995'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T18:40:44Z', 'nvd_published_at': '2018-04-12T01:29:00Z'} |
1.4.0 | GHSA-q2mx-j4x2-2h74 | 2022-05-24T22:03:07Z | 2022-05-24T22:03:07Z | null | ['CVE-2022-29214'] | URL Redirection to Untrusted Site ('Open Redirect') in next-auth | ### Impact
We found that this vulnerability is present when the developer is implementing an OAuth 1 provider (by extension, it means Twitter, which is the only built-in provider using OAuth 1), but **upgrading** is **still recommended**.
`next-auth` v3 users before version 3.29.3 are impacted. (We recommend upgradin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-q2mx-j4x2-2h74'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29214'}, {'type': 'PACKAGE', 'url': 'https://github.com/nextauthjs/next-auth'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-au... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:03:07Z', 'nvd_published_at': '2022-05-21T00:15:00Z'} |
1.4.0 | GHSA-ppwv-mvqg-q89h | 2022-12-02T20:22:45Z | 2022-05-18T00:00:41Z | null | ['CVE-2022-30961'] | Cross-site Scripting in Jenkins Autocomplete Parameter Plugin | Jenkins Autocomplete Parameter Plugin 1.1 and earlier does not escape the name of Dropdown Autocomplete and Auto Complete String parameters on views displaying parameters. This results in stored cross-site scripting (XSS) vulnerabilities exploitable by attackers with Item/Configure permission.
Exploitation of this vul... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:autocomplete-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30961'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/autocomplete-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2717'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:25:45Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-hc72-vj3g-5g2g | 2022-06-07T21:13:52Z | 2022-05-26T00:01:31Z | null | ['CVE-2022-29362'] | Cross-site Scripting in ZKEACMS | A cross-site scripting (XSS) vulnerability in /navigation/create?ParentID=%23 of ZKEACMS v3.5.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the ParentID parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'ZKEACMS.Publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29362'}, {'type': 'WEB', 'url': 'https://github.com/SeriaWei/ZKEACMS/issues/457'}, {'type': 'WEB', 'url': 'https://github.com/SeriaWei/ZKEACMS/commit/833c5460dc5c6152092f6ad54b8b832870a59903'}, {'type': 'PACKAGE', 'url': 'https://github.com/SeriaWe... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T21:13:52Z', 'nvd_published_at': '2022-05-25T01:15:00Z'} |
1.4.0 | GHSA-5ppx-rgw2-xg23 | 2022-07-01T22:03:22Z | 2022-05-14T01:04:30Z | null | ['CVE-2017-1000392'] | Improper Neutralization of Input During Web Page Generation in Jenkins | Jenkins 2.88 and earlier; 2.73.2 and earlier Autocompletion suggestions for text fields were not escaped, resulting in a persisted cross-site scripting vulnerability if the source for the suggestions allowed specifying text that includes HTML metacharacters like less-than and greater-than characters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.73.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.73.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000392'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/f67068170b55633571e5462e52b6124b23d7cb84'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advis... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T22:03:22Z', 'nvd_published_at': '2018-01-26T02:29:00Z'} |
1.4.0 | GHSA-g6hf-f9cq-q7w7 | 2022-07-07T23:20:49Z | 2022-05-13T01:02:39Z | null | ['CVE-2013-6429'] | Cross-Site Request Forgery in Spring Framework | The SourceHttpMessageConverter in Spring MVC in Spring Framework before 3.2.5 and 4.0.0.M1 through 4.0.0.RC1 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue, an... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.5.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.4.RELEASE'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6429'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/15704'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:20:49Z', 'nvd_published_at': '2014-01-26T16:58:00Z'} |
1.4.0 | GHSA-rp9p-863f-9c4h | 2023-02-14T01:00:04Z | 2022-05-17T03:46:33Z | null | ['CVE-2012-6092'] | Cross-site Scripting in Apache ActiveMQ | Multiple cross-site scripting (XSS) vulnerabilities in the web demos in Apache ActiveMQ before 5.8.0 allow remote attackers to inject arbitrary web script or HTML via (1) the refresh parameter to PortfolioPublishServlet.java (aka demo/portfolioPublish or Market Data Publisher), or vectors involving (2) debug logs or (3... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6092'}, {'type': 'WEB', 'url': 'https://fisheye6.atlassian.com/changelog/activemq?cs=1399577'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AMQ-4115'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/secure/ReleaseNote.jspa... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:00:04Z', 'nvd_published_at': '2013-04-21T21:55:00Z'} |
1.4.0 | GHSA-hmmx-wxh4-9w8w | 2023-07-31T21:50:15Z | 2022-05-17T02:36:38Z | null | ['CVE-2016-9857'] | phpMyAdmin XSS Vulnerability | An issue was discovered in phpMyAdmin. XSS is possible because of a weakness in a regular expression used in some JavaScript processing. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4'}, {'fixed': '4.4.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9857'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123194716/http://www.securityfocus.com/bid/94530'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/P... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:50:15Z', 'nvd_published_at': '2016-12-11T02:59:00Z'} |
1.4.0 | GHSA-xw5f-g937-wgm2 | 2023-07-27T00:55:03Z | 2022-05-14T04:03:59Z | null | ['CVE-2017-11889'] | ChakraCore RCE Vulnerability | ChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11889'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4411'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/66b9abb148705d2a36062931cd5a8466a588e6e4'}, {'type': 'WEB', 'url': 'https://portal.msrc... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T00:55:03Z', 'nvd_published_at': '2017-12-12T21:29:00Z'} |
1.4.0 | GHSA-22q6-wwq7-2jj9 | 2023-02-08T18:06:23Z | 2022-05-17T04:56:52Z | null | ['CVE-2013-1865'] | OpenStack Keystone Improper Authentication vulnerability | OpenStack Keystone Folsom (2012.2) does not properly perform revocation checks for Keystone PKI tokens when done through a server, which allows remote attackers to bypass intended access restrictions via a revoked PKI token. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2012.2'}, {'fixed': '2012.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1865'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0708'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-1865'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/keystone/+bug/1129713'}, {'type': ... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:06:23Z', 'nvd_published_at': '2013-03-22T21:55:00Z'} |
1.4.0 | GHSA-49m5-2838-q2rv | 2023-08-07T20:34:37Z | 2022-05-17T19:57:14Z | null | ['CVE-2014-2686'] | Ansible unsafe evaluation of some strings | Ansible prior to 1.5.4 mishandles the evaluation of some strings. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['ansible.utils.safe_eval']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2686'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/998793fd0ab55705d57527a38cee5e83f535974c'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!searchin/ansible-project/1.5.4/ansible-project/MUQxiKwSQDc/id6aVaawVboJ'... | {'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T20:34:37Z', 'nvd_published_at': '2020-01-09T13:15:00Z'} |
1.4.0 | GHSA-96mh-7xpr-qcgw | 2023-07-21T20:43:17Z | 2022-05-13T01:24:44Z | null | ['CVE-2018-7198'] | October CMS XSS | October CMS through 1.0.431 allows XSS by entering HTML on the Add Posts page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/october'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.431'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7198'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/44144/'}, {'type': 'WEB', 'url': 'http://securitywarrior9.blogspot.com/2018/02/html-injection-october-cms.html... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:43:17Z', 'nvd_published_at': '2018-02-18T03:29:00Z'} |
1.4.0 | GHSA-8p5x-w9cv-92hv | 2023-07-26T19:22:49Z | 2022-05-13T01:41:13Z | null | ['CVE-2017-1000361'] | OpenDaylight Controller DoS | DOMRpcImplementationNotAvailableException when sending Port-Status packets to OpenDaylight. Controller launches exceptions and consumes more CPU resources. Component: OpenDaylight is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opendaylight.controller:releasepom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000361'}, {'type': 'WEB', 'url': 'https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_2016.pdf'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T19:22:49Z', 'nvd_published_at': '2017-04-24T16:59:00Z'} |
1.4.0 | GHSA-rj7p-rfgp-852x | 2022-06-27T16:12:09Z | 2022-05-24T17:00:01Z | null | ['CVE-2019-0205'] | Loop with Unreachable Exit Condition in Apache Thrift | In Apache Thrift all versions up to and including 0.12.0, a server or client may run into an endless loop when feed with specific input data. Because the issue had already been partially fixed in version 0.11.0, depending on the installed version it affects only certain language bindings. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.12.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0205'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T16:12:09Z', 'nvd_published_at': '2019-10-29T19:15:00Z'} |
1.4.0 | GHSA-4cvm-5776-jx9f | 2023-08-16T22:07:25Z | 2022-05-14T02:03:45Z | null | ['CVE-2014-3498'] | Ansible Arbitrary Code Execution | User module in ansible before 1.6.6 is vulnerable to command execution. Ansible can get the result of remote command in variable, which may come from untrusted source of input. If the content of variable isn't properly filtered and when attempting to use the variable, it will trigger a function that passes it through j... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3498'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/8ed6350e65c82292a631f08845dfaacffe7f07f5'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1335551'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:07:25Z', 'nvd_published_at': '2017-06-08T18:29:00Z'} |
1.4.0 | GHSA-cg4h-cfjp-h3x2 | 2022-12-22T13:50:16Z | 2022-05-24T17:33:09Z | null | ['CVE-2020-2319'] | Password stored in plain text by Jenkins VMware Lab Manager Slaves Plugin | Jenkins VMware Lab Manager Slaves Plugin 0.2.8 and earlier stores a password unencrypted in the global `config.xml` file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:labmanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2319'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/labmanager-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2084'}] | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:50:16Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-66p6-7p29-55p9 | 2023-07-25T19:14:01Z | 2022-05-14T02:20:59Z | null | ['CVE-2018-14774'] | Symfony Host Header Injection | An issue was discovered in HttpKernel in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. When using HttpCache, the values of the X-Forwarded-Host headers are implicitly set as trusted while this should be forbidden, leading t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'last_affected': '2.7.48'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'last_affecte... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14774'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/725dee4cd8b4ccd52e335ae4b4522242cea9bd4a'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2018-14774-possible-host-header-injection-when-using-httpcache'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:14:01Z', 'nvd_published_at': '2018-08-03T17:29:00Z'} |
1.4.0 | GHSA-jcp9-796g-pv9p | 2022-07-07T23:29:01Z | 2022-05-17T03:56:06Z | null | ['CVE-2013-5679'] | Missing Cryptographic Step in OWASP Enterprise Security API for Java | The authenticated-encryption feature in the symmetric-encryption implementation in the OWASP Enterprise Security API (ESAPI) for Java 2.x before 2.1.0 does not properly resist tampering with serialized ciphertext, which makes it easier for remote attackers to bypass intended cryptographic protection mechanisms via an a... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.esapi:esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5679'}, {'type': 'WEB', 'url': 'http://code.google.com/p/owasp-esapi-java/issues/detail?id=306'}, {'type': 'WEB', 'url': 'http://lists.owasp.org/pipermail/esapi-dev/2013-August/002285.html'}, {'type': 'WEB', 'url': 'http://owasp-esapi-java.googleco... | {'cwe_ids': ['CWE-325'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:29:01Z', 'nvd_published_at': '2013-09-30T17:09:00Z'} |
1.4.0 | GHSA-wc2g-9j98-vcgw | 2023-01-06T17:03:11Z | 2022-05-24T17:10:29Z | null | ['CVE-2020-2152'] | Jenkins Subversion Release Manager Plugin vulnerable to cross-site scripting (XSS) | Subversion Release Manager Plugin 1.2 and earlier does not escape the error message for the Repository URL field form validation. This results in a reflected cross-site scripting vulnerability that can also be exploited similar to a stored cross-site scripting vulnerability by users with Job/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:svn-release-mgr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2152'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/svn-release-mgr-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1727'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T17:03:11Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
1.4.0 | GHSA-gjq3-997p-hg6f | 2023-07-31T22:11:40Z | 2022-05-13T01:41:13Z | null | ['CVE-2017-1000360'] | OpenDaylight NULL Pointer Dereference | StreamCorruptedException and NullPointerException in OpenDaylight odl-mdsal-xsql. Controller launches exceptions in the console. Component: OpenDaylight odl-mdsal-xsql is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opendaylight.controller:releasepom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000360'}, {'type': 'WEB', 'url': 'https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_2016.pdf'}] | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:11:40Z', 'nvd_published_at': '2017-04-24T16:59:00Z'} |
1.4.0 | GHSA-p9rc-x48f-582x | 2022-12-28T22:45:26Z | 2022-05-24T17:28:27Z | null | ['CVE-2020-2274'] | Passwords stored in plain text by ElasTest Plugin | Jenkins ElasTest Plugin 1.2.1 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:elastest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2274'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/elastest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-2014'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-312'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T22:45:26Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-vxhj-3x7p-jxp5 | 2022-07-06T19:44:49Z | 2022-05-17T03:49:16Z | null | ['CVE-2016-6345'] | Exposure of Sensitive Information to an Unauthorized Actor in RESTEasy | RESTEasy allows remote authenticated users to obtain sensitive information by leveraging "insufficient use of random values" in async jobs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.20.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.19.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6345'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1372117'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:44:49Z', 'nvd_published_at': '2016-09-07T18:59:00Z'} |
1.4.0 | GHSA-rpjm-422r-95mh | 2023-08-24T20:27:39Z | 2022-05-17T00:00:37Z | null | ['CVE-2022-30126'] | Regular expression denial of service in apache tika | In Apache Tika, a regular expression in our StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler.
This was o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.17'}, {'fixed': '1.28.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika'}, 'ecosystem_specific': {'affected_funct... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30126'}, {'type': 'WEB', 'url': 'https://github.com/apache/tika/commit/83b0de4d60161ebd4bc224141a959ac8c18d95f4'}, {'type': 'WEB', 'url': 'https://github.com/apache/tika/commit/a36711610fa1f6f5ba0f594803415af795e0b265'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:29:25Z', 'nvd_published_at': '2022-05-16T17:15:00Z'} |
1.4.0 | GHSA-h86w-m5rm-xr33 | 2023-02-14T00:32:49Z | 2022-05-17T05:20:42Z | null | ['CVE-2012-1618'] | Unescaped parameters in the PostgreSQL JDBC driver | Interaction error in the PostgreSQL JDBC driver before 8.2, when used with a PostgreSQL server with the "standard_conforming_strings" option enabled, such as the default configuration of PostgreSQL 9.1, does not properly escape unspecified JDBC statement parameters, which allows remote attackers to perform SQL injectio... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1618'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=754273'}, {'type': 'PACKAGE', 'url': 'https://github.com/pgjdbc/pgjdbc'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2012-03/0126.html'}, {'type... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:32:49Z', 'nvd_published_at': '2012-10-06T22:55:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.