schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-4fxw-g29w-r8mx | 2023-08-03T22:07:56Z | 2022-05-17T02:24:43Z | null | ['CVE-2015-8796'] | Apache Solr Cross-site scripting Vulnerability | Cross-site scripting (XSS) vulnerability in `webapp/web/js/scripts/schema-browser.js` in the Admin UI in Apache Solr before 5.3 allows remote attackers to inject arbitrary web script or HTML via a crafted schema-browse URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8796'}, {'type': 'WEB', 'url': 'https://github.com/apache/lucene/commit/dc2f2295e0a6c6574f033f295dc0c9adb7660df9'}, {'type': 'WEB', 'url': 'https://github.com/apache/solr/commit/dc2f2295e0a6c6574f033f295dc0c9adb7660df9'}, {'type': 'PACKAGE', 'url':... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:07:41Z', 'nvd_published_at': '2016-02-15T02:59:00Z'} |
1.4.0 | GHSA-j77r-2fxf-5jrw | 2022-06-02T17:41:47Z | 2022-05-04T18:04:07Z | null | ['CVE-2022-24877'] | Improper path handling in kustomization files allows path traversal | The kustomize-controller enables the use of Kustomize’s functionality when applying Kubernetes declarative state onto a cluster. A malicious user can use built-in features and a specially crafted `kustomization.yaml` to expose sensitive data from the controller’s pod filesystem. In multi-tenancy deployments this can le... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/kustomize-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.24.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/flux2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.... | [{'type': 'WEB', 'url': 'https://github.com/fluxcd/flux2/security/advisories/GHSA-j77r-2fxf-5jrw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24877'}, {'type': 'WEB', 'url': 'https://github.com/fluxcd/kustomize-controller/commit/f4528fb25d611da94e491346bea056d5c5c3611f'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T18:04:07Z', 'nvd_published_at': '2022-05-06T01:15:00Z'} |
1.4.0 | GHSA-wwfw-m54g-gv72 | 2023-09-28T20:19:36Z | 2022-05-13T01:21:25Z | null | ['CVE-2019-0648'] | ChakraCore information disclosure vulnerability | An information disclosure vulnerability exists when Chakra improperly discloses the contents of its memory, which could provide an attacker with information to further compromise the user's computer or data.To exploit the vulnerability, an attacker must know the memory address of where the object was created.The update... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0648'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5936'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1a7790f873b1a73d1cfec9548eb08a3b9fd798f3'}, {'type': 'PACKAGE', 'url': 'https://github.c... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T18:45:29Z', 'nvd_published_at': '2019-03-05T23:29:00Z'} |
1.4.0 | GHSA-hp87-p4gw-j4gq | 2023-08-30T13:53:00Z | 2022-05-20T00:00:17Z | null | ['CVE-2022-28948'] | gopkg.in/yaml.v3 Denial of Service | An issue in the Unmarshal function in Go-Yaml v3 can cause a program to panic when attempting to deserialize invalid input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'gopkg.in/yaml.v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-20220521103104-8f96da9f5d5e'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28948'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/issues/666'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/commit/8f96da9f5d5eff988554c1aae1784627c4bf6754'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-yaml/yaml'},... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:17:24Z', 'nvd_published_at': '2022-05-19T20:15:00Z'} |
1.4.0 | GHSA-9qmm-4mfr-r3wj | 2022-05-24T21:59:55Z | 2022-05-10T00:00:21Z | null | ['CVE-2022-23066'] | Incorrect Calculation in solana_rbpf | In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to transfer tokens or not.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'solana_rbpf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.26'}, {'fixed': '0.2.28'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23066'}, {'type': 'WEB', 'url': 'https://github.com/solana-labs/rbpf/commit/e61e045f8c244de978401d186dcfd50838817297'}, {'type': 'WEB', 'url': 'https://blocksecteam.medium.com/how-a-critical-bug-in-solana-network-was-detected-and-timely-patched-a70... | {'cwe_ids': ['CWE-682'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T21:59:55Z', 'nvd_published_at': '2022-05-09T07:15:00Z'} |
1.4.0 | GHSA-8vh6-8w76-v6m3 | 2023-07-25T23:30:15Z | 2022-05-13T01:24:44Z | null | ['CVE-2017-1000194'] | October CMS File Upload Vulnerability | October CMS build 412 is vulnerable to Apache configuration modification via file upload functionality resulting in site compromise and possibly other applications on the server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/october'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.412'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000194'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/compare/v1.0.412...v1.0.413#diff-c328b7b99eac0d17b3c71eb37038fd61R224'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T23:30:15Z', 'nvd_published_at': '2017-11-17T02:29:00Z'} |
1.4.0 | GHSA-vc29-mvwv-wpcq | 2023-01-09T20:14:12Z | 2022-05-01T07:15:05Z | null | ['CVE-2006-4067'] | Cross-site scripting (XSS) vulnerability in CakePHP | Cross-site scripting (XSS) vulnerability in cake/libs/error.php in CakePHP before 1.1.7.3363 allows remote attackers to inject arbitrary web script or HTML via the URL, which is reflected back in a 404 (\"Not Found\") error page. NOTE: some of these details are obtained from third party information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.1.2708'}, {'fixed': '1.1.7.3363'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.6.3264'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-4067'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/28256'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:14:12Z', 'nvd_published_at': '2006-08-10T00:04:00Z'} |
1.4.0 | GHSA-327c-qx3v-h673 | 2022-06-27T17:05:26Z | 2022-05-24T17:30:18Z | null | ['CVE-2020-1914'] | Always-Incorrect Control Flow Implementation in Facebook Hermes | A logic vulnerability when handling the SaveGeneratorLong instruction in Facebook Hermes prior to commit b2021df620824627f5a8c96615edbd1eb7fdddfc allows attackers to potentially read out of bounds or theoretically execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hermes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1914'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/issues/373'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/commit/b2021df620824627f5a8c96615edbd1eb7fdddfc'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/h... | {'cwe_ids': ['CWE-1119', 'CWE-670'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:23:21Z', 'nvd_published_at': '2020-10-08T19:15:00Z'} |
1.4.0 | GHSA-42xw-p62x-hwcf | 2022-06-29T19:13:33Z | 2022-05-13T01:02:18Z | null | ['CVE-2018-1313'] | Improper Access Control in Apache Derby | In Apache Derby 10.3.1.4 to 10.14.1.0, a specially-crafted network packet can be used to request the Derby Network Server to boot a database whose location and contents are under the user's control. If the Derby Network Server is not running with a Java Security Manager policy file, the attack is successful. If the ser... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.derby:derby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.3.1.4'}, {'fixed': '10.14.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.14.1.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1313'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T19:13:33Z', 'nvd_published_at': '2018-05-07T13:29:00Z'} |
1.4.0 | GHSA-pw27-w7w4-9qc7 | 2023-09-05T19:47:01Z | 2022-05-17T01:09:58Z | null | ['CVE-2016-2512'] | Django XSS Vulnerability | The `utils.http.is_safe_url function` in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by `http://mysite.example.c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2512'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123090815/http://www.securityfocus.com/bid/83879'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:18:51Z', 'nvd_published_at': '2016-04-08T15:59:00Z'} |
1.4.0 | GHSA-jjwj-w3gc-gcw4 | 2023-09-20T19:17:38Z | 2022-05-17T19:57:15Z | null | ['CVE-2014-5013'] | DOMPDF Remote Code Execution | DOMPDF before 0.6.2 allows remote code execution, a related issue to CVE-2014-2383. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5013'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/compare/v0.6.1...v0.6.2'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/releases/tag/v0.6.2'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T20:33:49Z', 'nvd_published_at': '2020-01-10T06:15:00Z'} |
1.4.0 | GHSA-85v8-vx4w-q684 | 2023-07-20T23:45:06Z | 2022-05-13T01:12:25Z | null | ['CVE-2018-14657'] | Keycloak Improper Bruteforce Detection | A flaw was found in Keycloak 4.2.1.Final, 4.3.0.Final. When TOPT enabled, an improper implementation of the Brute Force detection algorithm will not enforce its protection measures. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14657'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3592'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3593'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3595'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T23:45:06Z', 'nvd_published_at': '2018-11-13T19:29:00Z'} |
1.4.0 | GHSA-j8mx-x32r-5rf4 | 2023-07-31T21:48:00Z | 2022-05-17T02:36:37Z | null | ['CVE-2016-9856'] | phpMyAdmin XSS Vulnerability | An XSS issue was discovered in phpMyAdmin because of an improper fix for CVE-2016-2559 in PMASA-2016-10. This issue is resolved by using a copy of a hash to avoid a race condition. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4'}, {'fixed': '4.4.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9856'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123194716/http://www.securityfocus.com/bid/94530'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/P... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:48:00Z', 'nvd_published_at': '2016-12-11T02:59:00Z'} |
1.4.0 | GHSA-w4qx-vw2w-q566 | 2023-08-28T22:22:06Z | 2022-05-13T01:20:43Z | null | ['CVE-2018-8243'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8267. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8243'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/wiki/Roadmap#v185'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8243'}, {'type': 'WEB', 'url': 'https://web.archive.o... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T22:22:06Z', 'nvd_published_at': '2018-06-14T12:29:00Z'} |
1.4.0 | GHSA-p68c-xg89-2g5r | 2023-01-14T05:25:18Z | 2022-05-24T17:10:29Z | null | ['CVE-2020-2153'] | Credentials transmitted in plain text by Backlog Plugin | Backlog Plugin stores credentials in job `config.xml` files as part of its configuration.
While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Backlog Plugin 2.4 and earlier. These credentials could be viewed by users with Extended Read permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:backlog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2153'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/backlog-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1510'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/... | {'cwe_ids': ['CWE-319'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:25:18Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
1.4.0 | GHSA-p5pc-m4q7-7qm9 | 2023-09-26T19:48:05Z | 2022-05-24T22:01:14Z | null | ['CVE-2019-18658'] | Helm Unsafe Link Following | In Helm 2.x before 2.15.2, commands that deal with loading a chart as a directory or packaging a chart provide an opportunity for a maliciously designed chart to include sensitive content such as `/etc/passwd`, or to execute a denial of service (DoS) via a special file such as /dev/urandom, via symlinks. No version of ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.15.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18658'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://helm.sh/blog/2019-10-30-helm-symlink-security-notice/'}] | {'cwe_ids': ['CWE-59'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:57:06Z', 'nvd_published_at': '2019-11-12T14:15:00Z'} |
1.4.0 | GHSA-ccqf-c5hq-77mp | 2022-06-29T19:03:52Z | 2022-05-13T01:05:57Z | null | ['CVE-2018-8012'] | Missing Authorization in Apache ZooKeeper | No authentication/authorization is enforced when a server attempts to join a quorum in Apache ZooKeeper before 3.4.10, and 3.5.0-alpha through 3.5.3-beta. As a result an arbitrary end point could join the cluster and begin propagating counterfeit changes to the leader. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zookeeper:zookeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.zookeeper:zookeeper'}, '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8012'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b... | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T19:03:52Z', 'nvd_published_at': '2018-05-21T19:29:00Z'} |
1.4.0 | GHSA-853f-x27w-8r74 | 2023-08-21T19:53:38Z | 2022-05-24T17:17:36Z | null | ['CVE-2020-12760'] | OpenNMS Horizon RCE via Unsafe Deserialization | An issue was discovered in OpenNMS Horizon before 26.0.1, and Meridian before 2018.1.19 and 2019 before 2019.1.7. The ActiveMQ channel configuration allowed for arbitrary deserialization of Java objects (aka ActiveMQ Minion payload deserialization), leading to remote code execution for any authenticated channel user re... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opennms.core:org.opennms.core.daemon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '26.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12760'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/2983'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/e21fc14ce355533493da0db815bd81a66e291382'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/op... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T00:25:26Z', 'nvd_published_at': '2020-05-11T16:15:00Z'} |
1.4.0 | GHSA-w8v7-prhw-xjpw | 2023-07-25T21:59:21Z | 2022-05-13T01:02:10Z | null | ['CVE-2017-5641'] | Apache Flex BlazeDS unsafe deserialization | Previous versions of Apache Flex BlazeDS (4.7.2 and earlier) did not restrict which types were allowed for AMF(X) object deserialization by default. During the deserialization process code is executed that for several known types has undesired side-effects. Other, unknown types may also exhibit such behaviors. One vect... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.flex.blazeds:blazeds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5641'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/FLEX-35290'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03823en_us'}, {'type': 'WEB', 'url': 'https://web.archiv... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:59:21Z', 'nvd_published_at': '2017-12-28T15:29:00Z'} |
1.4.0 | GHSA-45h5-cqqw-9rjw | 2023-08-02T22:37:01Z | 2022-05-14T03:07:24Z | null | ['CVE-2017-17554'] | Aubio is vulnerable to a NULL pointer dereference | A NULL pointer dereference (DoS) Vulnerability was found in the function `aubio_source_avcodec_readframe` in io/source_avcodec.c of aubio, which may lead to DoS when playing a crafted audio file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'aubio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17554'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/commit/a81b12a3b4174953b3bc7ef4c37103f4d5636740'}, {'type': 'WEB', 'url': 'https://github.com/IvanCql/vulnerability/blob/master/An%20NULL%20pointer%20dereference(DoS)%20Vulnerability%2... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T22:37:01Z', 'nvd_published_at': '2017-12-12T01:29:00Z'} |
1.4.0 | GHSA-xv5f-2997-qhrq | 2023-07-27T22:27:30Z | 2022-05-17T02:48:13Z | null | ['CVE-2017-8052'] | Craft CMS XSS Vulnerability | Craft CMS before 2.6.2974 allows XSS attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2974'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8052'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/f7e57018ff487d1ebbe375f6cb1852f4d79767ff'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/2.6.2974/CHANGELOG.md#security'}, {'type': 'WEB', 'url': 'https://twitte... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T22:27:30Z', 'nvd_published_at': '2017-04-22T01:59:00Z'} |
1.4.0 | GHSA-h2mq-p9r5-wh94 | 2022-11-22T19:20:38Z | 2022-05-24T17:11:57Z | null | ['CVE-2019-20525'] | Ignite Realtime Openfire allows Cross-site Scripting | Ignite Realtime Openfire 4.4.1 allows XSS via the setup/setup-datasource-standard.jsp driver parameter. This issue was fixed in version 4.4.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20525'}, {'type': 'WEB', 'url': 'https://www.netsparker.com/web-applications-advisories/ns-19-015-reflected-cross-site-scripting-in-openfire/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:20:38Z', 'nvd_published_at': '2020-03-19T18:15:00Z'} |
1.4.0 | GHSA-r9jf-hf9x-7hrv | 2022-07-01T21:43:41Z | 2022-05-14T03:45:23Z | null | ['CVE-2017-1000505'] | Exposure of Sensitive Information to an Unauthorized Actor Jenkins Script Security Plugin | In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subjec... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.37'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.36'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000505'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-12-11/'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:43:41Z', 'nvd_published_at': '2018-01-25T18:29:00Z'} |
1.4.0 | GHSA-2xcm-h7vv-g8m9 | 2022-06-24T00:57:25Z | 2022-05-24T17:12:40Z | null | ['CVE-2020-2163'] | Improper Neutralization of Input During Web Page Generation in Jenkins | Jenkins 2.227 and earlier, LTS 2.204.5 and earlier improperly processes HTML content of list view column headers, resulting in a stored XSS vulnerability exploitable by users able to control column headers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.228'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.204.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2163'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1796'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/25/2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:57:25Z', 'nvd_published_at': '2020-03-25T17:15:00Z'} |
1.4.0 | GHSA-vpqp-hx68-p2wx | 2022-07-08T19:12:30Z | 2022-05-14T01:08:23Z | null | ['CVE-2013-2217'] | Improper Link Resolution Before File Access in Suds | cache.py in Suds 0.4, when tempdir is set to None, allows local users to redirect SOAP queries and possibly have other unspecified impact via a symlink attack on a cache file with a predictable name in /tmp/suds/. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'suds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2217'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978696'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vpqp-hx68-p2wx'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vuln... | {'cwe_ids': ['CWE-59'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:12:30Z', 'nvd_published_at': '2013-09-23T20:55:00Z'} |
1.4.0 | GHSA-j7q2-c6r4-x2jw | 2022-12-21T00:22:10Z | 2022-05-24T17:27:06Z | null | ['CVE-2020-2238'] | Stored XSS vulnerability in Jenkins Git Parameter Plugin | Jenkins Git Parameter Plugin 0.9.12 and earlier does not escape the repository field on the 'Build with Parameters' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Git Parameter Plugin 0.9.13 escapes the repository field on the 'Build with Pa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.tools:git-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.12'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2238'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-parameter-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1884'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T00:22:10Z', 'nvd_published_at': '2020-09-01T14:15:00Z'} |
1.4.0 | GHSA-m64j-j252-jxmr | 2023-08-29T18:51:52Z | 2022-05-17T05:08:48Z | null | ['CVE-2013-1842'] | TYPO3 SQL injection vulnerability in the Extbase Framework | SQL injection vulnerability in the Extbase Framework in TYPO3 4.5.x before 4.5.24, 4.6.x before 4.6.17, 4.7.x before 4.7.9, and 6.0.x before 6.0.3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, related to "the Query Object Model and relation values." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.24'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.23'}}, {'package': {'ecosystem': 'Packagi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1842'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00079.html'}, {'type': 'WEB', 'url': 'http://osvdb.org/90925'}, {'type': 'WEB', 'url': 'http://se... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:51:52Z', 'nvd_published_at': '2013-03-20T15:55:00Z'} |
1.4.0 | GHSA-hvcp-jvx5-4pmp | 2023-08-01T23:01:37Z | 2022-05-24T16:52:27Z | null | ['CVE-2019-7923'] | Magento 2 Community Edition SSRF vulnerability | A server-side request forgery (SSRF) vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by authenticated user with admin privileges to manipulate shipment settings to execute arbitrary code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7923'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:01:37Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-wp3j-gv53-4pg8 | 2023-07-31T22:09:51Z | 2022-05-13T01:41:14Z | null | ['CVE-2017-1000451'] | fs-git command injection vulnerability | fs-git is a file system like api for git repository. The fs-git version 1.0.1 module relies on child_process.exec, however, the buildCommand method used to construct exec strings does not properly sanitize data and is vulnerable to command injection across all methods that use it and call exec. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'fs-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000451'}, {'type': 'WEB', 'url': 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998'}, {'type': 'WEB', 'url': 'https://nodesecurity.io/advisories/360'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:09:51Z', 'nvd_published_at': '2018-01-02T17:29:00Z'} |
1.4.0 | GHSA-w3r9-r9w7-8h48 | 2023-09-29T17:09:10Z | 2022-05-24T17:11:45Z | null | ['CVE-2019-11939'] | Golang Facebook Thrift servers vulnerable to denial of service | Golang Facebook Thrift servers would not error upon receiving messages declaring containers of sizes larger than the payload. As a result, malicious clients could send short messages which would result in a large memory allocation, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/facebook/fbthrift'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.1-0.20200311080807-483ed864d69f'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11939'}, {'type': 'WEB', 'url': 'https://github.com/facebook/fbthrift/commit/483ed864d69f307e9e3b9dadec048216100c0757'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/fbthrift'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-008... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:26:28Z', 'nvd_published_at': '2020-03-18T01:15:00Z'} |
1.4.0 | GHSA-xpxp-v33m-5jp9 | 2023-08-15T23:42:53Z | 2022-05-17T05:16:32Z | null | ['CVE-2012-5368'] | phpMyAdmin Unsafe Fetching of Javascript Code | phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmyadmin.net without SSL, which allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks by modifying this code. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5368'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/50edafc0884aa15d0a1aa178089ac6a1ad2eb18a'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/a547f3d3e2cf36c6a904fa3e053fd8bddd3fbbb0'}, {'type':... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T23:42:53Z', 'nvd_published_at': '2012-10-25T10:51:00Z'} |
1.4.0 | GHSA-cghj-w42g-hqmr | 2023-07-06T22:51:39Z | 2022-05-14T01:45:28Z | null | ['CVE-2018-19785'] | XSS in PHP-Proxy-App through v3.0 | PHP-Proxy-App through 3.0 has Cross-Site Scripting (XSS) via the URL field in index.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'athlon1600/php-proxy-app'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19785'}, {'type': 'WEB', 'url': 'https://github.com/Athlon1600/php-proxy-app/issues/140'}, {'type': 'WEB', 'url': 'https://github.com/Athlon1600/php-proxy-app/commit/f74d9315ded7c05030023efcbedbcb24e8cc3a64'}, {'type': 'WEB', 'url': 'https://github... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T22:51:39Z', 'nvd_published_at': '2018-12-01T00:29:00Z'} |
1.4.0 | GHSA-xp8p-9rq5-4wgv | 2023-08-03T21:53:46Z | 2022-05-17T03:16:37Z | null | ['CVE-2015-5161'] | ZendXml and Zend Framework contain XXE and XEE Vulnerabilities | The `Zend_Xml_Security::scan` in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via mult... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5161'}, {'type': 'WEB', 'url': 'https://github.com/zendframework/zf1/issues/393'}, {'type': 'WEB', 'url': 'https://github.com/zendframework/ZendXml/commit/79f478fa2af85ce1fc18ac132dee5aa714c3b532'}, {'type': 'WEB', 'url': 'https://github.com/zendfr... | {'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:53:46Z', 'nvd_published_at': '2015-08-25T17:59:00Z'} |
1.4.0 | GHSA-jv62-6xvc-ccwh | 2023-02-23T22:09:36Z | 2022-05-24T16:56:47Z | null | ['CVE-2019-10424'] | Jenkins elOyente Plugin has Insufficiently Protected Credentials | elOyente Plugin stores a password unencrypted in its global configuration file `com.technicolor.eloyente.ElOyente.xm`l on the Jenkins controller. This password can be viewed by users with access to the Jenkins controller file system.
As of publication of this advisory, there is no fix. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.technicolor:elOyente'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10424'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/eloyente-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1561'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/0... | {'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:09:36Z', 'nvd_published_at': '2019-09-25T16:15:00Z'} |
1.4.0 | GHSA-pqj5-7r86-64fv | 2023-07-28T19:59:23Z | 2022-05-13T01:06:16Z | null | ['CVE-2016-2785'] | Puppet Improper Access Control | Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.3.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2785'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/pull/4921/commits/8d2ce797db265720f0a20d1d46ee2757b4e4f6b2'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2016-2785'}, {'type': 'WEB', 'url': 'https://security.gen... | {'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T19:59:23Z', 'nvd_published_at': '2016-06-10T15:59:00Z'} |
1.4.0 | GHSA-hvmc-7g2x-r3p9 | 2022-12-20T18:44:04Z | 2022-05-24T17:25:24Z | null | ['CVE-2020-2229'] | Jenkins Cross-Site Scripting vulnerability in help icons | Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons. Tooltip values can be contributed by plugins, some of which use user-specified values.\n\nThis results in a stored cross-site scripting (XSS) vulnerability.\n\nJenkins 2.252, LTS 2.235.4 escapes the tooltip content of ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.235.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.235.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2229'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1955'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160443/Jenkins-2.235.... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T23:18:53Z', 'nvd_published_at': '2020-08-12T14:15:00Z'} |
1.4.0 | GHSA-vjpc-vf4f-82qg | 2022-07-13T21:09:57Z | 2022-05-13T01:09:22Z | null | ['CVE-2012-2378'] | Improper Authentication in Apache CXF | Apache CXF 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and 2.6.x before 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote attackers to bypass the (1) AlgorithmSuite, (2) SignedParts, (3) SignedElements, (4) EncryptedParts, and (5) Enc... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.5'}, {'fixed': '2.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.1'}, {'fixed': '2.5.3'}]}]}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2378'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cxf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T21:09:57Z', 'nvd_published_at': '2013-01-05T00:55:00Z'} |
1.4.0 | GHSA-7qq6-fgpw-xw45 | 2023-07-26T17:46:47Z | 2022-05-13T01:47:31Z | null | ['CVE-2017-8383'] | Craft CMS Unauthorized View | Craft CMS before 2.6.2976 does not properly restrict viewing the contents of files in the `craft/app/` folder. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2976'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8383'}, {'type': 'WEB', 'url': 'https://craftcms.com/changelog#2-6-2976'}, {'type': 'WEB', 'url': 'https://twitter.com/CraftCMS/status/857743080224473088'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T17:46:47Z', 'nvd_published_at': '2017-05-01T06:59:00Z'} |
1.4.0 | GHSA-fhc8-h6hr-h9mq | 2023-07-13T17:10:32Z | 2022-05-24T17:08:34Z | null | ['CVE-2020-0767'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0674, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0767'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6375'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6375/commits/161c8957913ffb48bddef4423998b2eb642f35b3'}, {'type': 'PACKAGE', 'url': 'https... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:10:32Z', 'nvd_published_at': '2020-02-11T22:15:00Z'} |
1.4.0 | GHSA-x3jr-pf6g-c48f | 2023-08-01T23:32:27Z | 2022-05-24T16:46:15Z | null | ['CVE-2019-11841'] | Golang/crypto message forgery vulnerability | A message-forgery issue was discovered in crypto/openpgp/clearsign/clearsign.go in supplementary Go cryptography libraries 2019-03-25. According to the OpenPGP Message Format specification in RFC 4880 chapter 7, a cleartext signed message can contain one or more optional "Hash" Armor Headers. The "Hash" Armor Header sp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto/openpgp/clearsign'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11841'}, {'type': 'WEB', 'url': 'https://github.com/golang/crypto/commit/c05e17bb3b2dca130fc919668a96b4bec9eb9442'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/crypto/tree/master/openpgp/clearsign'}, {'type': 'WEB', 'url': 'https://go-re... | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:32:27Z', 'nvd_published_at': '2019-05-22T17:29:00Z'} |
1.4.0 | GHSA-hrg5-737c-2p56 | 2022-05-24T22:08:20Z | 2022-05-24T22:08:20Z | null | ['CVE-2022-29197'] | Missing validation causes denial of service via `UnsortedSegmentJoin` | ### Impact
The implementation of [`tf.raw_ops.UnsortedSegmentJoin`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/unsorted_segment_join_op.cc#L92-L95) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trig... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hrg5-737c-2p56'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29197'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/13d38a07ce9143e044aa737cfd7bb759d0e9b400'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:08:20Z', 'nvd_published_at': '2022-05-20T22:16:00Z'} |
1.4.0 | GHSA-cvj7-5f3c-9vg9 | 2022-05-24T22:21:10Z | 2022-05-24T22:21:10Z | null | ['CVE-2022-29219'] | AttesterSlashing number overflow | ### Impact
Possible consensus split given maliciously-crafted `AttesterSlashing` or `ProposerSlashing` being included on-chain.
Since we represent `uint64` values as native javascript `number`s, there is an issue when those variables with large (greater than 2^53) `uint64` values are included on chain. In those cases... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@chainsafe/lodestar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ChainSafe/lodestar/security/advisories/GHSA-cvj7-5f3c-9vg9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29219'}, {'type': 'WEB', 'url': 'https://github.com/ChainSafe/lodestar/pull/3977'}, {'type': 'PACKAGE', 'url': 'https://github.com/ChainSafe/lo... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:21:10Z', 'nvd_published_at': '2022-05-24T15:15:00Z'} |
1.4.0 | GHSA-vrmw-2xhq-hrmp | 2023-08-22T14:34:11Z | 2022-05-24T17:21:23Z | null | ['CVE-2020-10740'] | Wildfly Unsafe Deserialization Vulnerability | A vulnerability was found in Wildfly in versions before 20.0.0.Final, where a remote deserialization attack is possible in the Enterprise Application Beans(EJB) due to lack of validation/filtering capabilities in wildfly. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.0.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10740'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10740'}, {'type': 'PACKAGE', 'url': 'https://github.com/wildfly/wildfly'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T18:27:47Z', 'nvd_published_at': '2020-06-22T18:15:00Z'} |
1.4.0 | GHSA-8prc-58j4-m55q | 2023-08-01T22:43:19Z | 2022-05-24T16:58:47Z | null | ['CVE-2019-14832'] | Keycloak Unauthenticated Access | A flaw was found in the Keycloak REST API before version 8.0.0, implemented in Keycloak before 7.0.1 where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-model-infinispan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-model-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14832'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/0b73685ccf3181115ae3936a578708630215ac23'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14832'}] | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:43:19Z', 'nvd_published_at': '2019-10-15T19:15:00Z'} |
1.4.0 | GHSA-w598-25hm-jqx3 | 2022-12-22T14:00:39Z | 2022-05-24T17:12:40Z | null | ['CVE-2020-2166'] | RCE vulnerability in Jenkins Pipeline: AWS Steps Plugin | Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to Pipeline: AWS Steps Plugin’s build steps.
Pipeline: AWS Steps Plugin 1.41 ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'de.taimos:pipeline-aws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.41'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2166'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-aws-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1741'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T14:00:39Z', 'nvd_published_at': '2020-03-25T17:15:00Z'} |
1.4.0 | GHSA-p77r-c6m3-gj2r | 2023-07-25T21:30:51Z | 2022-05-14T03:09:04Z | null | ['CVE-2018-11647'] | oauth2orize-fprm XSS vulnerability | index.js in oauth2orize-fprm before 0.2.1 has XSS via a crafted URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'oauth2orize-fprm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11647'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/oauth2orize-fprm/commit/2bf9faee787eb004abbdfb6f4cc2fb06653defd5'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/oauth2orize-fprm/blob/master/SECURITY-NOTICE.md'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:30:51Z', 'nvd_published_at': '2018-06-17T16:29:00Z'} |
1.4.0 | GHSA-p76j-5v6v-6c22 | 2022-11-01T22:35:11Z | 2022-05-14T03:16:19Z | null | ['CVE-2018-1310'] | Apache NiFi JMS Deserialization issue | Apache NiFi JMS Deserialization issue because of ActiveMQ client vulnerability. Malicious JMS content could cause denial of service. See ActiveMQ CVE-2015-5254 announcement for more information. The fix to upgrade the activemq-client library to 5.15.3 was applied on the Apache NiFi 1.6.0 release. Users running a prior ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1310'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018-1310'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:35:11Z', 'nvd_published_at': '2018-05-23T14:29:00Z'} |
1.4.0 | GHSA-wxqg-fg7v-mmc6 | 2023-08-17T22:32:04Z | 2022-05-13T01:05:39Z | null | ['CVE-2013-3630'] | Moodle Authenticated Spelling Binary Remote Code Execution | Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3630'}, {'type': 'WEB', 'url': 'https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one'}, {'type': 'WEB', 'url': 'https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats'}... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:32:04Z', 'nvd_published_at': '2013-11-01T02:55:00Z'} |
1.4.0 | GHSA-9g8w-pjpr-prr4 | 2022-11-04T20:36:05Z | 2022-05-13T01:36:55Z | null | ['CVE-2017-2594'] | Path Traversal in io.hawt:project | hawtio before versions 2.0-beta-1, 2.0-beta-2, 2.0-m1, 2.0-m2, 2.0-m3, and 1.5 are vulnerable to a path traversal that leads to a NullPointerException with a full stacktrace. An attacker could use this flaw to gather undisclosed information from within hawtio's root. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.hawt:project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2594'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2594'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:36:05Z', 'nvd_published_at': '2018-05-08T17:29:00Z'} |
1.4.0 | GHSA-625g-gx8c-xcmg | 2023-08-16T21:44:35Z | 2022-05-14T02:09:22Z | null | ['CVE-2014-0482'] | Django Middleware Enables Session Hijacking | The `contrib.auth.middleware.RemoteUserMiddleware` middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the `contrib.auth.backends.RemoteUserBackend` backend, allows remote authenticated users to hijack web sessions via vectors related to the `REMOTE... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.9'}]}]}, {'package': {'ecosystem': 'PyP... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0482'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/0268b855f9eab3377f2821164ef3e66037789e09'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/5307ce565fbedb9cc27cbe7c757b41a00438d37c'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:44:35Z', 'nvd_published_at': '2014-08-26T14:55:00Z'} |
1.4.0 | GHSA-qwrf-gfpj-qvj6 | 2022-06-08T16:30:51Z | 2022-05-24T22:04:04Z | null | ['CVE-2022-29188'] | Smokescreen SSRF via deny list bypass (square brackets) | ### Impact
The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure.
Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/stripe/smokescreen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/stripe/smokescreen/security/advisories/GHSA-qwrf-gfpj-qvj6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29188'}, {'type': 'WEB', 'url': 'https://github.com/stripe/smokescreen/commit/dea7b3c89df000f4072ff9866d61d78e30df6a36'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:04:04Z', 'nvd_published_at': '2022-05-21T00:15:00Z'} |
1.4.0 | GHSA-8572-5jrg-mx52 | 2022-11-02T00:41:25Z | 2022-05-14T03:57:45Z | null | ['CVE-2016-3723'] | Exposure of Sensitive Information in Jenkins Core | Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with read access to obtain sensitive plugin installation information by leveraging missing permissions checks in unspecified XML/JSON API endpoints. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3723'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1206'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11'}, {'type': 'WEB', 'url': 'https://www.cloudbees.com/jenkin... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:41:25Z', 'nvd_published_at': '2016-05-17T14:08:00Z'} |
1.4.0 | GHSA-5v5w-44w6-q5hv | 2022-07-01T13:43:01Z | 2022-05-17T04:47:27Z | null | ['CVE-2014-2829'] | Erlang Solutions MongooseIM vulnerable to denial of service (DoS) via crafted XMPP stream | Erlang Solutions MongooseIM through 1.3.1 rev. 2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack. | [] | [{'package': {'ecosystem': 'Hex', 'name': 'MongooseIM'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2829'}, {'type': 'WEB', 'url': 'https://github.com/esl/MongooseIM/commit/586d96cc12ef218243a3466354b4d208b5472a6c'}, {'type': 'PACKAGE', 'url': 'https://github.com/esl/MongooseIM/'}, {'type': 'WEB', 'url': 'http://xmpp.org/resources/security-notice... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T13:43:01Z', 'nvd_published_at': '2014-04-11T01:55:00Z'} |
1.4.0 | GHSA-jr83-vr4j-mp6p | 2023-07-28T20:59:59Z | 2022-05-14T00:57:47Z | null | ['CVE-2016-3954'] | web2py exposure of sensitive information | web2py before 2.14.2 allows remote attackers to obtain the session_cookie_key value via a direct request to examples/simple_examples/status. NOTE: this issue can be leveraged by remote attackers to execute arbitrary code using CVE-2016-3957. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'web2py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3954'}, {'type': 'WEB', 'url': 'https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4030-1/'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:59:59Z', 'nvd_published_at': '2018-02-06T18:29:00Z'} |
1.4.0 | GHSA-hch9-6qrj-5f49 | 2022-12-06T21:29:48Z | 2022-05-24T16:59:36Z | null | ['CVE-2019-10469'] | Jenkins Kubernetes CI/CD Plugin vulnerable to Improper Authorization | A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
## Note: Jenkins has suspended distri... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.elasticbox.jenkins-ci.plugins:kubernetes-ci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10469'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-ci-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/kubernetes-... | {'cwe_ids': ['CWE-276', 'CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:29:48Z', 'nvd_published_at': '2019-10-23T13:15:00Z'} |
1.4.0 | GHSA-3w5p-jhp5-c29q | 2022-10-21T21:05:54Z | 2022-05-24T17:18:28Z | null | ['CVE-2020-1108'] | .NET Core & .NET Framework Denial of Service Vulnerability | A denial of service vulnerability exists when .NET Core or .NET Framework improperly handles web requests, aka '.NET Core & .NET Framework Denial of Service Vulnerability'. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1108'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/157'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1108'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-21T21:05:54Z', 'nvd_published_at': '2020-05-21T23:15:00Z'} |
1.4.0 | GHSA-jx66-5ww9-m6q4 | 2022-06-21T20:13:38Z | 2022-05-24T19:11:39Z | null | ['CVE-2021-28490'] | Cross-Site Request Forgery in OWASP CSRFGuard | In OWASP CSRFGuard through 3.1.0, CSRF can occur because the CSRF cookie may be retrieved by using only a session token. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.owasp:csrfguard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28490'}, {'type': 'PACKAGE', 'url': 'https://github.com/OWASP/www-project-csrfguard'}, {'type': 'WEB', 'url': 'https://github.com/reidmefirst/vuln-disclosure/blob/main/2021-01.txt'}, {'type': 'WEB', 'url': 'https://owasp.org/www-project-csrfguard/'... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:13:38Z', 'nvd_published_at': '2021-08-19T19:15:00Z'} |
1.4.0 | GHSA-r9pc-g29w-f86j | 2023-07-28T21:53:52Z | 2022-05-13T01:12:38Z | null | ['CVE-2016-2190'] | Moodle sensitive information disclosure | Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 does not properly restrict links, which allows remote attackers to obtain sensitive URL information by reading a Referer log. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7'}, {'fixed': '2.7.13'}]}]},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2190'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=330181'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210801130148/http://www.securitytracker.com/id/1035333'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T21:53:52Z', 'nvd_published_at': '2016-05-22T20:59:00Z'} |
1.4.0 | GHSA-7q56-mp4c-gggg | 2022-07-06T19:44:12Z | 2022-05-17T03:35:31Z | null | ['CVE-2016-5393'] | Improper Access Control in Apache Hadoop | In Apache Hadoop 2.6.x before 2.6.5 and 2.7.x before 2.7.3, a remote user who can authenticate with the HDFS NameNode can possibly run arbitrary commands with the same privileges as the HDFS service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5393'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/hadoop-general/201611.mbox/%3CCAA0W1bTbUmUUSF1rjRpX-2DvWutcrPt7TJSWUcSLg1F0gyHG1Q%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/94574'}] | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:44:12Z', 'nvd_published_at': '2016-11-29T06:59:00Z'} |
1.4.0 | GHSA-ffqj-6fqr-9h24 | 2022-06-08T16:29:45Z | 2022-05-24T22:17:27Z | null | ['CVE-2022-29217'] | Key confusion through non-blocklisted public key formats | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Disclosed by Aapo Oksman (Senior Security Specialist, Nixu Corporation).
> PyJWT supports multiple different JWT signing algorithms. With JWT, an
> attacker submitting the JWT token can choose the used signing algorithm.
>
> The PyJWT library requires ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyjwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jpadilla/pyjwt/security/advisories/GHSA-ffqj-6fqr-9h24'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29217'}, {'type': 'WEB', 'url': 'https://github.com/jpadilla/pyjwt/commit/9c528670c455b8d948aff95ed50e22940d1ad3fc'}, {'type': 'PACKAGE', 'url': 'h... | {'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:17:27Z', 'nvd_published_at': '2022-05-24T15:15:00Z'} |
1.4.0 | GHSA-qfr3-323w-qv27 | 2022-05-25T22:40:03Z | 2022-05-25T22:40:03Z | null | ['CVE-2022-29567'] | Possible information disclosure inside TreeGrid component with default data provider | ### Description
The default configuration of a TreeGrid component uses Object::toString as a key on the client-side and server communication in Vaadin 14.8.5 through 14.8.9, 22.0.6 through 22.0.14, 23.0.0.beta2 through 23.0.8 and 23.1.0.alpha1 through 23.1.0.alpha4, resulting in potential information disclosure of val... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.8.5'}, {'fixed': '14.8.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '22.0.6'}, {'fixed': '22.0.15'}]}]... | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-qfr3-323w-qv27'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29567'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow-components/pull/3046'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/plat... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:40:03Z', 'nvd_published_at': '2022-05-24T15:15:00Z'} |
1.4.0 | GHSA-vjxx-54vw-q59f | 2023-09-28T20:35:53Z | 2022-05-14T01:17:52Z | null | ['CVE-2019-6970'] | Moodle SSRF Vulnerability | The `edit_blog.php` script allows a registered user to add external RSS feed resources. It was identified that this feature could be abused to be used as a SSRF attack vector by adding a malicious URL/TCP PORT in order to target internal network or an internet hosted server, bypassing firewall rules, IP filtering and m... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6970'}, {'type': 'WEB', 'url': 'https://excellium-services.com/cert-xlm-advisory/cve-2019-6970/'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T20:37:25Z', 'nvd_published_at': '2019-03-21T16:01:00Z'} |
1.4.0 | GHSA-22jm-p2vv-j2hc | 2023-07-31T18:51:11Z | 2022-05-14T02:46:11Z | null | ['CVE-2016-7136'] | Plone XSS | z3c.form in Plone CMS 5.x through 5.0.6 and 4.x through 4.3.11 allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted GET request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'last_affected': '5.0.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'last_affected': '4.3.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7136'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20160830/non-persistent-xss-in-plone-forms'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210625091607/http://www.securityfocus.com/bid/92752'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:51:11Z', 'nvd_published_at': '2017-03-07T16:59:00Z'} |
1.4.0 | GHSA-86cf-g34f-7462 | 2023-01-26T23:57:13Z | 2022-05-14T03:48:04Z | null | ['CVE-2014-4995'] | VladTheEnterprising allows local users to obtain sensitive information by reading MySQL root password from temporary file | Race condition in `lib/vlad/dba/mysql.rb` in the VladTheEnterprising gem 0.2 for Ruby allows local users to obtain sensitive information by reading the MySQL root password from a temporary file before it is removed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'VladTheEnterprising'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4995'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/94745'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229054941/http://www.securityfocus.com/bid/68729'}, {'type': 'WEB', 'url': 'http://www.openwall.c... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:57:13Z', 'nvd_published_at': '2018-01-10T18:29:00Z'} |
1.4.0 | GHSA-36pq-cjh9-fv46 | 2023-09-20T20:06:13Z | 2022-05-14T01:38:21Z | null | ['CVE-2019-7170'] | Croogo vulnerable to XSS in title field | A stored-self XSS exists in Croogo allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/taxonomy/vocabularies. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7170'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/issues/890'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/commit/cafaaabe2cef3d1d83652370e30563e6ad7c4158'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:39:06Z', 'nvd_published_at': '2019-01-29T18:29:00Z'} |
1.4.0 | GHSA-mw4r-5mfc-m5vc | 2022-12-02T20:12:38Z | 2022-05-18T00:00:41Z | null | ['CVE-2022-30967'] | Cross site scripting in Jenkins Selection tasks Plugin | Jenkins Selection tasks Plugin 1.0 and earlier does not escape the name and description of Script Selection task variable parameters on views displaying parameters. This results in stored cross-site scripting (XSS) vulnerabilities exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerabil... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:selection-tasks-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30967'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/selection-tasks-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2717'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:11:31Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-5j25-5hjr-w7m2 | 2023-09-25T19:17:06Z | 2022-05-24T16:52:29Z | null | ['CVE-2019-7951'] | Magento 2 Community Edition Information Leak | An information leakage vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. A SOAP web service endpoint does not properly enforce parameters related to access control. This could be abused to leak customer information via crafted SOAP requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7951'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:16:57Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-vxf2-7rc3-pxmx | 2023-09-18T23:34:20Z | 2022-05-01T02:00:38Z | null | ['CVE-2005-1632'] | Cheetah Path Search Order Hijacking | Cheetah 0.9.15 and 0.9.16 searches the `/tmp` directory for modules before using the paths in the `PYTHONPATH` variable, which allows local users to execute arbitrary code via a malicious module in `/tmp/`. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'cheetah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.15'}, {'last_affected': '0.9.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2005-1632'}, {'type': 'PACKAGE', 'url': 'https://github.com/cheetahtemplate/cheetah'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20050430021153/http://sourceforge.net/mailarchive/forum.php?thread_id=7070332&forum_id=1542'}] | {'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T23:34:20Z', 'nvd_published_at': '2005-05-17T04:00:00Z'} |
1.4.0 | GHSA-p56j-x44h-g66j | 2022-06-28T22:57:34Z | 2022-05-24T16:51:50Z | null | ['CVE-2019-10355'] | Incorrect Privilege Assignment in Jenkins Script Security Plugin | A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of type casts allowed attackers to execute arbitrary code in sandboxed scripts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.62'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.61'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10355'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/script-security-plugin/commit/5dc2e2465f309c772237a4b2de9caf61ba9b585b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2594'}, {'type': 'WEB', 'url': 'https://acces... | {'cwe_ids': ['CWE-266'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:57:34Z', 'nvd_published_at': '2019-07-31T13:15:00Z'} |
1.4.0 | GHSA-m8x2-4gc8-9v3r | 2022-12-12T17:01:53Z | 2022-05-14T02:56:39Z | null | ['CVE-2018-1000605'] | Jenkins CollabNet Plugin man in the middle vulnerability | A man in the middle vulnerability exists in Jenkins CollabNet Plugin 2.0.4 and earlier in CollabNetApp.java, CollabNetPlugin.java, CNFormFieldValidator.java that allows attackers to impersonate any service that Jenkins connects to. CollabNet Plugin 2.0.5 and newer no longer does that. It instead requires users to opt i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:collabnet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000605'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/collabnet-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-25/#SECURITY-941'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T17:01:53Z', 'nvd_published_at': '2018-06-26T17:29:00Z'} |
1.4.0 | GHSA-9gcf-pq99-rjw3 | 2023-08-16T22:49:38Z | 2022-05-17T01:27:10Z | null | ['CVE-2014-1604'] | RPLY Predictable Tmpfile Names Allows Cache Spoofing | The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'RPLY'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1604'}, {'type': 'WEB', 'url': 'https://github.com/alex/rply/commit/fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/90593'}, {'type': 'WEB', 'url': 'http://bugs.debian.org/cgi... | {'cwe_ids': ['CWE-377'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:49:38Z', 'nvd_published_at': '2014-01-28T00:55:00Z'} |
1.4.0 | GHSA-9qpf-v72j-j9qh | 2023-07-26T21:31:36Z | 2022-05-14T01:06:51Z | null | ['CVE-2017-11909'] | ChakraCore RCE Vulnerability | ChakraCore and Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-201... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11909'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4411'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/0e4566a4c394cb69834719704a05aa17101ae3f5'}, {'type': 'WEB', 'url': 'https://portal.msrc... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T21:31:36Z', 'nvd_published_at': '2017-12-12T21:29:00Z'} |
1.4.0 | GHSA-3p6c-9xhm-8x7h | 2023-07-25T23:29:04Z | 2022-05-13T01:24:44Z | null | ['CVE-2017-1000193'] | October CMS XSS | October CMS build 412 is vulnerable to stored XSS in brand logo image name resulting in JavaScript code execution in the victim's browser. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/october'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.412'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000193'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/compare/v1.0.412...v1.0.413#diff-66d6dfe5e11488e1afefcb69b8bdaabfR31'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T23:29:04Z', 'nvd_published_at': '2017-11-17T02:29:00Z'} |
1.4.0 | GHSA-hx53-635r-vmv8 | 2022-12-16T22:20:54Z | 2022-05-24T17:35:09Z | null | ['CVE-2020-2323'] | Missing permission checks in Jenkins Chaos Monkey Plugin | Chaos Monkey Plugin 0.4 and earlier does not perform permission checks in an HTTP endpoint.
This allows attackers with Overall/Read permission to access the Chaos Monkey page and to see the history of actions.
Chaos Monkey Plugin 0.4.1 requires Overall/Administer permission to access the Chaos Monkey page and to see ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:chaos-monkey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2323'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/chaos-monkey-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2109%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T22:20:54Z', 'nvd_published_at': '2020-12-03T16:15:00Z'} |
1.4.0 | GHSA-g78x-xmv8-23xp | 2022-07-01T21:53:08Z | 2022-05-14T01:04:36Z | null | ['CVE-2017-1000399'] | Exposure of Sensitive Information to an Unauthorized Actor in Jenkins | The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /queue/item/(ID)/api showed information about tasks in the queue (typically builds waiting to start). This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.73.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.73.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000399'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/3ff432ace14d8f4544c88a179a2f7a962eb98ba6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenk... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:53:08Z', 'nvd_published_at': '2018-01-26T02:29:00Z'} |
1.4.0 | GHSA-6qx9-rf9g-7jmr | 2022-07-06T21:03:48Z | 2022-05-17T04:12:57Z | null | ['CVE-2014-8125'] | Improper Input Validation in Drools and jBPM | XML external entity (XXE) vulnerability in Drools and jBPM before 6.2.0 allows remote attackers to read arbitrary files or possibly have other unspecified impact via a crafted BPMN2 file. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.drools:drools-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.2.0.CR4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jbpm:jbpm-bpmn2'}, 'ranges': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8125'}, {'type': 'WEB', 'url': 'https://github.com/droolsjbpm/drools/commit/c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3'}, {'type': 'WEB', 'url': 'https://github.com/droolsjbpm/jbpm/commit/713e8073ecf45623cfc5c918c5cbf700203f46e5'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:03:48Z', 'nvd_published_at': '2015-04-21T17:59:00Z'} |
1.4.0 | GHSA-9hg5-7hwc-v434 | 2022-11-04T22:32:10Z | 2022-05-24T17:05:08Z | null | ['CVE-2019-6035'] | Athenz vulnerable to Open Redirect | Open redirect vulnerability in Athenz v1.8.24 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.yahoo.athenz:athenz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.25'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6035'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/athenz/pull/700'}, {'type': 'WEB', 'url': 'https://github.com/AthenZ/athenz/commit/c4dc89b31fda501af45c20b33db620a077079744'}, {'type': 'PACKAGE', 'url': 'https://github.com/AthenZ/athenz'}, ... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T22:32:10Z', 'nvd_published_at': '2019-12-26T16:15:00Z'} |
1.4.0 | GHSA-3mxq-v9rw-m6x9 | 2023-09-25T19:15:31Z | 2022-05-24T16:52:28Z | null | ['CVE-2019-7944'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting vulnerability exists in the product comments field of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with privileges to the Return Product comments fiel... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7944'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220127030535/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-24'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T18:40:34Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-pvm9-288c-v5wq | 2022-11-03T23:37:06Z | 2022-05-17T03:42:18Z | null | ['CVE-2016-3082'] | Remote Code Execution in Apache Struts | XSLTResult allows for the location of a stylesheet being passed as a request parameter. In some circumstances this can be used to inject remotely executable code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.20.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.24'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3082'}, {'type': 'WEB', 'url': 'http://struts.apache.org/docs/s2-031.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:37:06Z', 'nvd_published_at': '2016-04-26T14:59:00Z'} |
1.4.0 | GHSA-mrgh-6x42-x6xf | 2022-07-13T15:56:19Z | 2022-05-17T05:13:24Z | null | ['CVE-2012-4446'] | Improper Authentication in Apache Qpid | The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4446'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=851355'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/QPID-4631'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0561.html'}, {'type': 'W... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:56:19Z', 'nvd_published_at': '2013-03-14T03:10:00Z'} |
1.4.0 | GHSA-qxf8-8837-hq7w | 2022-06-01T19:43:45Z | 2022-05-13T01:15:07Z | null | ['CVE-2019-1003031'] | Script security sandbox bypass in Matrix Project Plugin | A sandbox bypass vulnerability exists in Jenkins Matrix Project Plugin 1.13 and earlier in pom.xml, src/main/java/hudson/matrix/FilterScript.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:matrix-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003031'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0739'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/matrix-project-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-03-06/#SECURIT... | {'cwe_ids': ['CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:43:45Z', 'nvd_published_at': '2019-03-08T21:29:00Z'} |
1.4.0 | GHSA-q446-82vq-w674 | 2022-07-06T19:44:21Z | 2022-05-13T01:09:33Z | null | ['CVE-2016-5725'] | Improper Limitation of a Pathname to a Restricted Directory in JCraft JSch | Directory traversal vulnerability in JCraft JSch before 0.1.54 on Windows, when the mode is ChannelSftp.OVERWRITE, allows remote SFTP servers to write to arbitrary files via a ..\ (dot dot backslash) in a response to a recursive GET command. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.jcraft:jsch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.54'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.1.53'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5725'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3115'}, {'type': 'WEB', 'url': 'https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-5725'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:44:21Z', 'nvd_published_at': '2017-01-19T22:59:00Z'} |
1.4.0 | GHSA-c4mc-49hq-q275 | 2023-08-29T21:02:11Z | 2022-05-14T00:56:45Z | null | ['CVE-2012-1906'] | Puppet uses predictable filenames, allowing arbitrary file overwrite | Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 uses predictable file names when installing Mac OS X packages from a remote source, which allows local users to overwrite arbitrary files or install arbitrary packages via a symlink attack... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6'}, {'fixed': '2.6.15'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1906'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/f7829ec1f1b2c3def8e0eda09c22c3c1fed3a27f'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/74793'}, {'type': 'WEB', 'url': 'https://github.com... | {'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:02:11Z', 'nvd_published_at': '2012-05-29T20:55:00Z'} |
1.4.0 | GHSA-vcmm-ppqx-95ch | 2023-07-28T20:52:56Z | 2022-05-14T00:58:12Z | null | ['CVE-2016-1000221'] | Logstash Logs Sensitive Information | Logstash prior to version 2.3.4, Elasticsearch Output plugin would log to file HTTP authorization headers which could contain sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'logstash-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000221'}, {'type': 'PACKAGE', 'url': 'https://github.com/elastic/logstash'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124065200/http://www.securityfocus.com/bid/99126'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/secu... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:52:56Z', 'nvd_published_at': '2017-06-16T21:29:00Z'} |
1.4.0 | GHSA-cj2f-96jq-phpp | 2023-07-31T18:33:51Z | 2022-05-14T02:46:24Z | null | ['CVE-2016-3109'] | Shopware RCE Vulnerability | The `backend/Login/load/` script in Shopware before 5.1.5 allows remote attackers to execute arbitrary code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3109'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/d73e9031a5b2ab6e918eb86d1e2b2e873cd3558d'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200814090044/http://www.securityfocus.com/archive/1/538173/100/0/threaded'... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:33:51Z', 'nvd_published_at': '2017-04-21T20:59:00Z'} |
1.4.0 | GHSA-9wr9-fw9v-8fgr | 2023-09-26T19:17:22Z | 2022-05-24T17:00:27Z | null | ['CVE-2019-8141'] | Magento 2 Community Edition RCE Vulnerability | A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. An authenticated user with administrative privileges (system level import) can execute arbitrary code through a Phar deserialization vulnerability in the import functionality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8141'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:07:22Z', 'nvd_published_at': '2019-11-06T00:15:00Z'} |
1.4.0 | GHSA-5wpj-c6f7-24x8 | 2022-05-24T22:13:59Z | 2022-05-24T22:13:59Z | null | ['CVE-2022-29207'] | Undefined behavior when users supply invalid resource handles | ### Impact
Multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid:
```python
import tensorflow as tf
tf.raw_ops.QueueIsClosedV2(handle=[])
```
```python
import tensorflow as tf
tf.summary.flush(writer=())
```
In graph mode, it would have been impossible to per... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5wpj-c6f7-24x8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29207'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a5b89cd68c02329d793356bda85d079e9e69b4e7'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-20', 'CWE-475'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:13:59Z', 'nvd_published_at': '2022-05-20T22:16:00Z'} |
1.4.0 | GHSA-43q7-q5vp-3g68 | 2022-11-03T23:45:57Z | 2022-05-14T02:59:22Z | null | ['CVE-2018-14371'] | Path Traversal in Eclipse Mojarra | The getLocalePrefix function in ResourceManager.java in Eclipse Mojarra before 2.3.7 is affected by Directory Traversal via the loc parameter. A remote attacker can download configuration files or Java bytecodes from applications. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.glassfish:mojarra-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14371'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/mojarra/pull/4384'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/mojarra/commit/1b434748d9239f42eae8aa7d37d7a0930c061e24'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:45:57Z', 'nvd_published_at': '2018-07-18T12:29:00Z'} |
1.4.0 | GHSA-v49x-8hvm-q347 | 2022-11-03T21:08:10Z | 2022-05-14T01:29:43Z | null | ['CVE-2018-1306'] | Exposure of Sensitive Information in Apache Pluto | The PortletV3AnnotatedDemo Multipart Portlet war file code provided in Apache Pluto version 3.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to restrict path information provided during a file upload. An attacker could exploit this vulnerability to obtain configuration data and... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.pluto:pluto-container'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1306'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/portals-pluto'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45396/'}, {'type': 'WEB', 'url': 'http://portals.apache.org/pluto/security.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T21:08:10Z', 'nvd_published_at': '2018-06-27T18:29:00Z'} |
1.4.0 | GHSA-xv69-6rf3-w5g2 | 2022-12-15T17:26:41Z | 2022-05-24T17:45:45Z | null | ['CVE-2021-21631'] | Missing permission check in Jenkins Cloud Statistics Plugin | Cloud Statistics Plugin 0.26 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission and knowledge of random activity IDs to view related provisioning exception error messages.
Cloud Statistics Plugin 0.27 requires Overall/Administer permission to access... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloud-stats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.26'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21631'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cloud-stats-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2246'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security... | {'cwe_ids': ['CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:26:41Z', 'nvd_published_at': '2021-03-30T12:16:00Z'} |
1.4.0 | GHSA-mmhr-3jr7-qj2p | 2023-05-24T14:56:44Z | 2022-05-14T02:01:18Z | null | ['CVE-2018-15121'] | Auth0-ASPNET and Auth0-ASPNET-Owin vulnerable to Cross-Site Request Forgery | An issue was discovered in Auth0 auth0-aspnet and auth0-aspnet-owin. Affected packages do not use or validate the state parameter of the OAuth 2.0 and OpenID Connect protocols. This leaves applications vulnerable to CSRF attacks during authentication and authorization operations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Auth0-ASPNET-Owin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'auth0-aspnet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15121'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2018-15121'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/auth0-aspnet-owin'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Auth0-ASPNET-Owin'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T14:56:44Z', 'nvd_published_at': '2018-08-29T03:29:00Z'} |
1.4.0 | GHSA-52wr-3vww-rmpq | 2023-08-16T23:29:45Z | 2022-05-17T04:44:24Z | null | ['CVE-2014-3242'] | SOAPpy vulnerable to XML External Entity attacks | SOAPpy 0.12.5 allows remote attackers to read arbitrary files via a SOAP request containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'SOAPpy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3242'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiorky/soappy'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150501220613/http://www.pnigos.com/?p=260'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229062311/http://www... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:29:45Z', 'nvd_published_at': '2014-05-12T14:55:00Z'} |
1.4.0 | GHSA-c2gg-rrhc-fvvg | 2023-07-17T21:00:15Z | 2022-05-24T16:52:25Z | null | ['CVE-2019-7886'] | Magento 2 Community Edition Cryptographic Flaw | A cryptograhic flaw exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. A weak cryptograhic mechanism is used to generate the intialization vector in multiple security relevant contexts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7886'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121011306/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-33'}] | {'cwe_ids': ['CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T21:00:15Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-c252-xc8v-mqmm | 2023-07-31T23:42:03Z | 2022-05-13T01:25:27Z | null | ['CVE-2015-2067'] | MAGMI plugin for Magento Server Directory Traversal | Directory traversal vulnerability in web/ajax_pluginconf.php in the MAGMI (aka Magento Mass Importer) plugin for Magento Server allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'dweeves/magmi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.21'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2067'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210122162452/http://www.securityfocus.com/bid/74881'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/130250/Magento-Server-MAGMI-Cross-Site-Scripting-Local-File-Inclusion.... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T23:42:03Z', 'nvd_published_at': '2015-02-24T17:59:00Z'} |
1.4.0 | GHSA-82v2-f875-73g9 | 2023-09-26T16:35:36Z | 2022-05-24T16:58:43Z | null | ['CVE-2019-14838'] | Wildfly Authorization Misconfiguration | A flaw was found in wildfly-core before 7.2.5.GA. The Management users with Monitor, Auditor and Deployer Roles should not be allowed to modify the runtime state of the server | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.core:wildfly-host-controller'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.5.GA'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14838'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly-core/pull/3981'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly-core/commit/131fa6880ae1523fac9e96df54dc394b63b0eed3'}, {'type': 'WEB', 'url': 'https://access.redhat.c... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:50:01Z', 'nvd_published_at': '2019-10-14T15:15:00Z'} |
1.4.0 | GHSA-mw5w-cf76-73m8 | 2023-07-17T20:36:37Z | 2022-05-24T16:52:26Z | null | ['CVE-2019-7895'] | Magento 2 Community Edition RCE Vulnerability | A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with admin privileges to layouts can execute arbitrary code through a crafted XML layout update. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7895'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:36:37Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-h22x-hm8g-rxpg | 2022-07-01T20:36:40Z | 2022-05-17T00:29:00Z | null | ['CVE-2017-12620'] | Improper Restriction of XML External Entity Reference in Apache OpenNLP | When loading models or dictionaries that contain XML it is possible to perform an XXE attack, since Apache OpenNLP is a library, this only affects applications that load models or dictionaries from untrusted sources. The versions 1.5.0 to 1.5.3, 1.6.0, 1.7.0 to 1.7.2, 1.8.0 to 1.8.1 of Apache OpenNLP are affected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.opennlp:opennlp-tools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12620'}, {'type': 'WEB', 'url': 'http://opennlp.apache.org/news/cve-2017-12620.html'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T20:36:40Z', 'nvd_published_at': '2017-10-03T01:29:00Z'} |
1.4.0 | GHSA-r3pq-mp8v-cp33 | 2023-08-29T21:41:11Z | 2022-05-17T05:12:26Z | null | ['CVE-2012-4345'] | phpMyAdmin Multiple Cross-site Scripting Vulnerabilities in the Database Structure page | Multiple cross-site scripting (XSS) vulnerabilities in the Database Structure page in phpMyAdmin 3.4.x before 3.4.11.1 and 3.5.x before 3.5.2.2 allow remote authenticated users to inject arbitrary web script or HTML via (1) a crafted table name during table creation, or a (2) Empty link or (3) Drop link for a crafted t... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4'}, {'fixed': '3.4.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'aff... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4345'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150523055725/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2012:136/?name=MDVSA-2012:136'}, {'type': 'WEB', 'url': 'http://www.phpmyadmin.net/home_page/security/P... | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:41:11Z', 'nvd_published_at': '2012-08-21T23:55:00Z'} |
1.4.0 | GHSA-5h9g-8xcv-qjq9 | 2022-06-21T20:11:43Z | 2022-05-24T19:17:42Z | null | ['CVE-2021-3878'] | Improper Restriction of XML External Entity Reference in Stanford CoreNLP | corenlp is vulnerable to Improper Restriction of XML External Entity Reference | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'edu.stanford.nlp:stanford-corenlp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3878'}, {'type': 'WEB', 'url': 'https://github.com/stanfordnlp/corenlp/commit/e5bbe135a02a74b952396751ed3015e8b8252e99'}, {'type': 'PACKAGE', 'url': 'https://github.com/stanfordnlp/CoreNLP'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a11c8... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:11:43Z', 'nvd_published_at': '2021-10-15T14:15:00Z'} |
1.4.0 | GHSA-45w3-2hvv-pfxq | 2022-07-07T23:22:41Z | 2022-05-17T04:39:49Z | null | ['CVE-2013-6408'] | XML Injection in Apache Solr | The DocumentAnalysisRequestHandler in Apache Solr before 4.3.1 does not properly use the EmptyEntityResolver, which allows remote attackers to have an unspecified impact via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. NOTE: ... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6408'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-4881'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1844.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0029.html'}, {'type': 'WEB... | {'cwe_ids': ['CWE-91'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:22:41Z', 'nvd_published_at': '2013-12-07T20:55:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.