schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-4fxw-g29w-r8mx
2023-08-03T22:07:56Z
2022-05-17T02:24:43Z
null
['CVE-2015-8796']
Apache Solr Cross-site scripting Vulnerability
Cross-site scripting (XSS) vulnerability in `webapp/web/js/scripts/schema-browser.js` in the Admin UI in Apache Solr before 5.3 allows remote attackers to inject arbitrary web script or HTML via a crafted schema-browse URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8796'}, {'type': 'WEB', 'url': 'https://github.com/apache/lucene/commit/dc2f2295e0a6c6574f033f295dc0c9adb7660df9'}, {'type': 'WEB', 'url': 'https://github.com/apache/solr/commit/dc2f2295e0a6c6574f033f295dc0c9adb7660df9'}, {'type': 'PACKAGE', 'url':...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:07:41Z', 'nvd_published_at': '2016-02-15T02:59:00Z'}
1.4.0
GHSA-j77r-2fxf-5jrw
2022-06-02T17:41:47Z
2022-05-04T18:04:07Z
null
['CVE-2022-24877']
Improper path handling in kustomization files allows path traversal
The kustomize-controller enables the use of Kustomize’s functionality when applying Kubernetes declarative state onto a cluster. A malicious user can use built-in features and a specially crafted `kustomization.yaml` to expose sensitive data from the controller’s pod filesystem. In multi-tenancy deployments this can le...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/kustomize-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.24.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/flux2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0....
[{'type': 'WEB', 'url': 'https://github.com/fluxcd/flux2/security/advisories/GHSA-j77r-2fxf-5jrw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24877'}, {'type': 'WEB', 'url': 'https://github.com/fluxcd/kustomize-controller/commit/f4528fb25d611da94e491346bea056d5c5c3611f'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T18:04:07Z', 'nvd_published_at': '2022-05-06T01:15:00Z'}
1.4.0
GHSA-wwfw-m54g-gv72
2023-09-28T20:19:36Z
2022-05-13T01:21:25Z
null
['CVE-2019-0648']
ChakraCore information disclosure vulnerability
An information disclosure vulnerability exists when Chakra improperly discloses the contents of its memory, which could provide an attacker with information to further compromise the user's computer or data.To exploit the vulnerability, an attacker must know the memory address of where the object was created.The update...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0648'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5936'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1a7790f873b1a73d1cfec9548eb08a3b9fd798f3'}, {'type': 'PACKAGE', 'url': 'https://github.c...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T18:45:29Z', 'nvd_published_at': '2019-03-05T23:29:00Z'}
1.4.0
GHSA-hp87-p4gw-j4gq
2023-08-30T13:53:00Z
2022-05-20T00:00:17Z
null
['CVE-2022-28948']
gopkg.in/yaml.v3 Denial of Service
An issue in the Unmarshal function in Go-Yaml v3 can cause a program to panic when attempting to deserialize invalid input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'gopkg.in/yaml.v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-20220521103104-8f96da9f5d5e'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28948'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/issues/666'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/commit/8f96da9f5d5eff988554c1aae1784627c4bf6754'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-yaml/yaml'},...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:17:24Z', 'nvd_published_at': '2022-05-19T20:15:00Z'}
1.4.0
GHSA-9qmm-4mfr-r3wj
2022-05-24T21:59:55Z
2022-05-10T00:00:21Z
null
['CVE-2022-23066']
Incorrect Calculation in solana_rbpf
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to transfer tokens or not....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'solana_rbpf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.26'}, {'fixed': '0.2.28'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23066'}, {'type': 'WEB', 'url': 'https://github.com/solana-labs/rbpf/commit/e61e045f8c244de978401d186dcfd50838817297'}, {'type': 'WEB', 'url': 'https://blocksecteam.medium.com/how-a-critical-bug-in-solana-network-was-detected-and-timely-patched-a70...
{'cwe_ids': ['CWE-682'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T21:59:55Z', 'nvd_published_at': '2022-05-09T07:15:00Z'}
1.4.0
GHSA-8vh6-8w76-v6m3
2023-07-25T23:30:15Z
2022-05-13T01:24:44Z
null
['CVE-2017-1000194']
October CMS File Upload Vulnerability
October CMS build 412 is vulnerable to Apache configuration modification via file upload functionality resulting in site compromise and possibly other applications on the server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'october/october'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.412'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000194'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/compare/v1.0.412...v1.0.413#diff-c328b7b99eac0d17b3c71eb37038fd61R224'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T23:30:15Z', 'nvd_published_at': '2017-11-17T02:29:00Z'}
1.4.0
GHSA-vc29-mvwv-wpcq
2023-01-09T20:14:12Z
2022-05-01T07:15:05Z
null
['CVE-2006-4067']
Cross-site scripting (XSS) vulnerability in CakePHP
Cross-site scripting (XSS) vulnerability in cake/libs/error.php in CakePHP before 1.1.7.3363 allows remote attackers to inject arbitrary web script or HTML via the URL, which is reflected back in a 404 (\"Not Found\") error page. NOTE: some of these details are obtained from third party information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.1.2708'}, {'fixed': '1.1.7.3363'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.6.3264'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-4067'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/28256'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:14:12Z', 'nvd_published_at': '2006-08-10T00:04:00Z'}
1.4.0
GHSA-327c-qx3v-h673
2022-06-27T17:05:26Z
2022-05-24T17:30:18Z
null
['CVE-2020-1914']
Always-Incorrect Control Flow Implementation in Facebook Hermes
A logic vulnerability when handling the SaveGeneratorLong instruction in Facebook Hermes prior to commit b2021df620824627f5a8c96615edbd1eb7fdddfc allows attackers to potentially read out of bounds or theoretically execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hermes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1914'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/issues/373'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/commit/b2021df620824627f5a8c96615edbd1eb7fdddfc'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/h...
{'cwe_ids': ['CWE-1119', 'CWE-670'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:23:21Z', 'nvd_published_at': '2020-10-08T19:15:00Z'}
1.4.0
GHSA-42xw-p62x-hwcf
2022-06-29T19:13:33Z
2022-05-13T01:02:18Z
null
['CVE-2018-1313']
Improper Access Control in Apache Derby
In Apache Derby 10.3.1.4 to 10.14.1.0, a specially-crafted network packet can be used to request the Derby Network Server to boot a database whose location and contents are under the user's control. If the Derby Network Server is not running with a Java Security Manager policy file, the attack is successful. If the ser...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.derby:derby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.3.1.4'}, {'fixed': '10.14.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.14.1.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1313'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T19:13:33Z', 'nvd_published_at': '2018-05-07T13:29:00Z'}
1.4.0
GHSA-pw27-w7w4-9qc7
2023-09-05T19:47:01Z
2022-05-17T01:09:58Z
null
['CVE-2016-2512']
Django XSS Vulnerability
The `utils.http.is_safe_url function` in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by `http://mysite.example.c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2512'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123090815/http://www.securityfocus.com/bid/83879'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:18:51Z', 'nvd_published_at': '2016-04-08T15:59:00Z'}
1.4.0
GHSA-jjwj-w3gc-gcw4
2023-09-20T19:17:38Z
2022-05-17T19:57:15Z
null
['CVE-2014-5013']
DOMPDF Remote Code Execution
DOMPDF before 0.6.2 allows remote code execution, a related issue to CVE-2014-2383.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5013'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/compare/v0.6.1...v0.6.2'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/releases/tag/v0.6.2'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T20:33:49Z', 'nvd_published_at': '2020-01-10T06:15:00Z'}
1.4.0
GHSA-85v8-vx4w-q684
2023-07-20T23:45:06Z
2022-05-13T01:12:25Z
null
['CVE-2018-14657']
Keycloak Improper Bruteforce Detection
A flaw was found in Keycloak 4.2.1.Final, 4.3.0.Final. When TOPT enabled, an improper implementation of the Brute Force detection algorithm will not enforce its protection measures.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14657'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3592'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3593'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3595'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T23:45:06Z', 'nvd_published_at': '2018-11-13T19:29:00Z'}
1.4.0
GHSA-j8mx-x32r-5rf4
2023-07-31T21:48:00Z
2022-05-17T02:36:37Z
null
['CVE-2016-9856']
phpMyAdmin XSS Vulnerability
An XSS issue was discovered in phpMyAdmin because of an improper fix for CVE-2016-2559 in PMASA-2016-10. This issue is resolved by using a copy of a hash to avoid a race condition. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4'}, {'fixed': '4.4....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9856'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123194716/http://www.securityfocus.com/bid/94530'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/P...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:48:00Z', 'nvd_published_at': '2016-12-11T02:59:00Z'}
1.4.0
GHSA-w4qx-vw2w-q566
2023-08-28T22:22:06Z
2022-05-13T01:20:43Z
null
['CVE-2018-8243']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8267.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8243'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/wiki/Roadmap#v185'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8243'}, {'type': 'WEB', 'url': 'https://web.archive.o...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T22:22:06Z', 'nvd_published_at': '2018-06-14T12:29:00Z'}
1.4.0
GHSA-p68c-xg89-2g5r
2023-01-14T05:25:18Z
2022-05-24T17:10:29Z
null
['CVE-2020-2153']
Credentials transmitted in plain text by Backlog Plugin
Backlog Plugin stores credentials in job `config.xml` files as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Backlog Plugin 2.4 and earlier. These credentials could be viewed by users with Extended Read permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:backlog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2153'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/backlog-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1510'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/...
{'cwe_ids': ['CWE-319'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:25:18Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}
1.4.0
GHSA-p5pc-m4q7-7qm9
2023-09-26T19:48:05Z
2022-05-24T22:01:14Z
null
['CVE-2019-18658']
Helm Unsafe Link Following
In Helm 2.x before 2.15.2, commands that deal with loading a chart as a directory or packaging a chart provide an opportunity for a maliciously designed chart to include sensitive content such as `/etc/passwd`, or to execute a denial of service (DoS) via a special file such as /dev/urandom, via symlinks. No version of ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.15.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18658'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://helm.sh/blog/2019-10-30-helm-symlink-security-notice/'}]
{'cwe_ids': ['CWE-59'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:57:06Z', 'nvd_published_at': '2019-11-12T14:15:00Z'}
1.4.0
GHSA-ccqf-c5hq-77mp
2022-06-29T19:03:52Z
2022-05-13T01:05:57Z
null
['CVE-2018-8012']
Missing Authorization in Apache ZooKeeper
No authentication/authorization is enforced when a server attempts to join a quorum in Apache ZooKeeper before 3.4.10, and 3.5.0-alpha through 3.5.3-beta. As a result an arbitrary end point could join the cluster and begin propagating counterfeit changes to the leader.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zookeeper:zookeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.zookeeper:zookeeper'}, '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8012'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b...
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T19:03:52Z', 'nvd_published_at': '2018-05-21T19:29:00Z'}
1.4.0
GHSA-853f-x27w-8r74
2023-08-21T19:53:38Z
2022-05-24T17:17:36Z
null
['CVE-2020-12760']
OpenNMS Horizon RCE via Unsafe Deserialization
An issue was discovered in OpenNMS Horizon before 26.0.1, and Meridian before 2018.1.19 and 2019 before 2019.1.7. The ActiveMQ channel configuration allowed for arbitrary deserialization of Java objects (aka ActiveMQ Minion payload deserialization), leading to remote code execution for any authenticated channel user re...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms.core:org.opennms.core.daemon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '26.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12760'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/2983'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/e21fc14ce355533493da0db815bd81a66e291382'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/op...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T00:25:26Z', 'nvd_published_at': '2020-05-11T16:15:00Z'}
1.4.0
GHSA-w8v7-prhw-xjpw
2023-07-25T21:59:21Z
2022-05-13T01:02:10Z
null
['CVE-2017-5641']
Apache Flex BlazeDS unsafe deserialization
Previous versions of Apache Flex BlazeDS (4.7.2 and earlier) did not restrict which types were allowed for AMF(X) object deserialization by default. During the deserialization process code is executed that for several known types has undesired side-effects. Other, unknown types may also exhibit such behaviors. One vect...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.flex.blazeds:blazeds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5641'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/FLEX-35290'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03823en_us'}, {'type': 'WEB', 'url': 'https://web.archiv...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:59:21Z', 'nvd_published_at': '2017-12-28T15:29:00Z'}
1.4.0
GHSA-45h5-cqqw-9rjw
2023-08-02T22:37:01Z
2022-05-14T03:07:24Z
null
['CVE-2017-17554']
Aubio is vulnerable to a NULL pointer dereference
A NULL pointer dereference (DoS) Vulnerability was found in the function `aubio_source_avcodec_readframe` in io/source_avcodec.c of aubio, which may lead to DoS when playing a crafted audio file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'aubio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17554'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/commit/a81b12a3b4174953b3bc7ef4c37103f4d5636740'}, {'type': 'WEB', 'url': 'https://github.com/IvanCql/vulnerability/blob/master/An%20NULL%20pointer%20dereference(DoS)%20Vulnerability%2...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T22:37:01Z', 'nvd_published_at': '2017-12-12T01:29:00Z'}
1.4.0
GHSA-xv5f-2997-qhrq
2023-07-27T22:27:30Z
2022-05-17T02:48:13Z
null
['CVE-2017-8052']
Craft CMS XSS Vulnerability
Craft CMS before 2.6.2974 allows XSS attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2974'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8052'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/f7e57018ff487d1ebbe375f6cb1852f4d79767ff'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/2.6.2974/CHANGELOG.md#security'}, {'type': 'WEB', 'url': 'https://twitte...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T22:27:30Z', 'nvd_published_at': '2017-04-22T01:59:00Z'}
1.4.0
GHSA-h2mq-p9r5-wh94
2022-11-22T19:20:38Z
2022-05-24T17:11:57Z
null
['CVE-2019-20525']
Ignite Realtime Openfire allows Cross-site Scripting
Ignite Realtime Openfire 4.4.1 allows XSS via the setup/setup-datasource-standard.jsp driver parameter. This issue was fixed in version 4.4.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20525'}, {'type': 'WEB', 'url': 'https://www.netsparker.com/web-applications-advisories/ns-19-015-reflected-cross-site-scripting-in-openfire/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:20:38Z', 'nvd_published_at': '2020-03-19T18:15:00Z'}
1.4.0
GHSA-r9jf-hf9x-7hrv
2022-07-01T21:43:41Z
2022-05-14T03:45:23Z
null
['CVE-2017-1000505']
Exposure of Sensitive Information to an Unauthorized Actor Jenkins Script Security Plugin
In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subjec...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.37'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.36'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000505'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-12-11/'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:43:41Z', 'nvd_published_at': '2018-01-25T18:29:00Z'}
1.4.0
GHSA-2xcm-h7vv-g8m9
2022-06-24T00:57:25Z
2022-05-24T17:12:40Z
null
['CVE-2020-2163']
Improper Neutralization of Input During Web Page Generation in Jenkins
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier improperly processes HTML content of list view column headers, resulting in a stored XSS vulnerability exploitable by users able to control column headers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.228'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.204.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2163'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1796'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/25/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:57:25Z', 'nvd_published_at': '2020-03-25T17:15:00Z'}
1.4.0
GHSA-vpqp-hx68-p2wx
2022-07-08T19:12:30Z
2022-05-14T01:08:23Z
null
['CVE-2013-2217']
Improper Link Resolution Before File Access in Suds
cache.py in Suds 0.4, when tempdir is set to None, allows local users to redirect SOAP queries and possibly have other unspecified impact via a symlink attack on a cache file with a predictable name in /tmp/suds/.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'suds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2217'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978696'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vpqp-hx68-p2wx'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vuln...
{'cwe_ids': ['CWE-59'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:12:30Z', 'nvd_published_at': '2013-09-23T20:55:00Z'}
1.4.0
GHSA-j7q2-c6r4-x2jw
2022-12-21T00:22:10Z
2022-05-24T17:27:06Z
null
['CVE-2020-2238']
Stored XSS vulnerability in Jenkins Git Parameter Plugin
Jenkins Git Parameter Plugin 0.9.12 and earlier does not escape the repository field on the 'Build with Parameters' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. Git Parameter Plugin 0.9.13 escapes the repository field on the 'Build with Pa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.tools:git-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.12'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2238'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-parameter-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1884'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T00:22:10Z', 'nvd_published_at': '2020-09-01T14:15:00Z'}
1.4.0
GHSA-m64j-j252-jxmr
2023-08-29T18:51:52Z
2022-05-17T05:08:48Z
null
['CVE-2013-1842']
TYPO3 SQL injection vulnerability in the Extbase Framework
SQL injection vulnerability in the Extbase Framework in TYPO3 4.5.x before 4.5.24, 4.6.x before 4.6.17, 4.7.x before 4.7.9, and 6.0.x before 6.0.3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, related to "the Query Object Model and relation values."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.24'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.23'}}, {'package': {'ecosystem': 'Packagi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1842'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00079.html'}, {'type': 'WEB', 'url': 'http://osvdb.org/90925'}, {'type': 'WEB', 'url': 'http://se...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:51:52Z', 'nvd_published_at': '2013-03-20T15:55:00Z'}
1.4.0
GHSA-hvcp-jvx5-4pmp
2023-08-01T23:01:37Z
2022-05-24T16:52:27Z
null
['CVE-2019-7923']
Magento 2 Community Edition SSRF vulnerability
A server-side request forgery (SSRF) vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by authenticated user with admin privileges to manipulate shipment settings to execute arbitrary code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7923'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:01:37Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-wp3j-gv53-4pg8
2023-07-31T22:09:51Z
2022-05-13T01:41:14Z
null
['CVE-2017-1000451']
fs-git command injection vulnerability
fs-git is a file system like api for git repository. The fs-git version 1.0.1 module relies on child_process.exec, however, the buildCommand method used to construct exec strings does not properly sanitize data and is vulnerable to command injection across all methods that use it and call exec.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'fs-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000451'}, {'type': 'WEB', 'url': 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998'}, {'type': 'WEB', 'url': 'https://nodesecurity.io/advisories/360'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:09:51Z', 'nvd_published_at': '2018-01-02T17:29:00Z'}
1.4.0
GHSA-w3r9-r9w7-8h48
2023-09-29T17:09:10Z
2022-05-24T17:11:45Z
null
['CVE-2019-11939']
Golang Facebook Thrift servers vulnerable to denial of service
Golang Facebook Thrift servers would not error upon receiving messages declaring containers of sizes larger than the payload. As a result, malicious clients could send short messages which would result in a large memory allocation, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/facebook/fbthrift'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.1-0.20200311080807-483ed864d69f'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11939'}, {'type': 'WEB', 'url': 'https://github.com/facebook/fbthrift/commit/483ed864d69f307e9e3b9dadec048216100c0757'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/fbthrift'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-008...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:26:28Z', 'nvd_published_at': '2020-03-18T01:15:00Z'}
1.4.0
GHSA-xpxp-v33m-5jp9
2023-08-15T23:42:53Z
2022-05-17T05:16:32Z
null
['CVE-2012-5368']
phpMyAdmin Unsafe Fetching of Javascript Code
phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmyadmin.net without SSL, which allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks by modifying this code.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5368'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/50edafc0884aa15d0a1aa178089ac6a1ad2eb18a'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/a547f3d3e2cf36c6a904fa3e053fd8bddd3fbbb0'}, {'type':...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T23:42:53Z', 'nvd_published_at': '2012-10-25T10:51:00Z'}
1.4.0
GHSA-cghj-w42g-hqmr
2023-07-06T22:51:39Z
2022-05-14T01:45:28Z
null
['CVE-2018-19785']
XSS in PHP-Proxy-App through v3.0
PHP-Proxy-App through 3.0 has Cross-Site Scripting (XSS) via the URL field in index.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'athlon1600/php-proxy-app'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19785'}, {'type': 'WEB', 'url': 'https://github.com/Athlon1600/php-proxy-app/issues/140'}, {'type': 'WEB', 'url': 'https://github.com/Athlon1600/php-proxy-app/commit/f74d9315ded7c05030023efcbedbcb24e8cc3a64'}, {'type': 'WEB', 'url': 'https://github...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T22:51:39Z', 'nvd_published_at': '2018-12-01T00:29:00Z'}
1.4.0
GHSA-xp8p-9rq5-4wgv
2023-08-03T21:53:46Z
2022-05-17T03:16:37Z
null
['CVE-2015-5161']
ZendXml and Zend Framework contain XXE and XEE Vulnerabilities
The `Zend_Xml_Security::scan` in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via mult...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5161'}, {'type': 'WEB', 'url': 'https://github.com/zendframework/zf1/issues/393'}, {'type': 'WEB', 'url': 'https://github.com/zendframework/ZendXml/commit/79f478fa2af85ce1fc18ac132dee5aa714c3b532'}, {'type': 'WEB', 'url': 'https://github.com/zendfr...
{'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:53:46Z', 'nvd_published_at': '2015-08-25T17:59:00Z'}
1.4.0
GHSA-jv62-6xvc-ccwh
2023-02-23T22:09:36Z
2022-05-24T16:56:47Z
null
['CVE-2019-10424']
Jenkins elOyente Plugin has Insufficiently Protected Credentials
elOyente Plugin stores a password unencrypted in its global configuration file `com.technicolor.eloyente.ElOyente.xm`l on the Jenkins controller. This password can be viewed by users with access to the Jenkins controller file system. As of publication of this advisory, there is no fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.technicolor:elOyente'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10424'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/eloyente-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1561'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/0...
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:09:36Z', 'nvd_published_at': '2019-09-25T16:15:00Z'}
1.4.0
GHSA-pqj5-7r86-64fv
2023-07-28T19:59:23Z
2022-05-13T01:06:16Z
null
['CVE-2016-2785']
Puppet Improper Access Control
Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.3.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2785'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/pull/4921/commits/8d2ce797db265720f0a20d1d46ee2757b4e4f6b2'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2016-2785'}, {'type': 'WEB', 'url': 'https://security.gen...
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T19:59:23Z', 'nvd_published_at': '2016-06-10T15:59:00Z'}
1.4.0
GHSA-hvmc-7g2x-r3p9
2022-12-20T18:44:04Z
2022-05-24T17:25:24Z
null
['CVE-2020-2229']
Jenkins Cross-Site Scripting vulnerability in help icons
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons. Tooltip values can be contributed by plugins, some of which use user-specified values.\n\nThis results in a stored cross-site scripting (XSS) vulnerability.\n\nJenkins 2.252, LTS 2.235.4 escapes the tooltip content of ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.235.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.235.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2229'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1955'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160443/Jenkins-2.235....
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T23:18:53Z', 'nvd_published_at': '2020-08-12T14:15:00Z'}
1.4.0
GHSA-vjpc-vf4f-82qg
2022-07-13T21:09:57Z
2022-05-13T01:09:22Z
null
['CVE-2012-2378']
Improper Authentication in Apache CXF
Apache CXF 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and 2.6.x before 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote attackers to bypass the (1) AlgorithmSuite, (2) SignedParts, (3) SignedElements, (4) EncryptedParts, and (5) Enc...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.5'}, {'fixed': '2.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.1'}, {'fixed': '2.5.3'}]}]}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2378'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cxf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T21:09:57Z', 'nvd_published_at': '2013-01-05T00:55:00Z'}
1.4.0
GHSA-7qq6-fgpw-xw45
2023-07-26T17:46:47Z
2022-05-13T01:47:31Z
null
['CVE-2017-8383']
Craft CMS Unauthorized View
Craft CMS before 2.6.2976 does not properly restrict viewing the contents of files in the `craft/app/` folder.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2976'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8383'}, {'type': 'WEB', 'url': 'https://craftcms.com/changelog#2-6-2976'}, {'type': 'WEB', 'url': 'https://twitter.com/CraftCMS/status/857743080224473088'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T17:46:47Z', 'nvd_published_at': '2017-05-01T06:59:00Z'}
1.4.0
GHSA-fhc8-h6hr-h9mq
2023-07-13T17:10:32Z
2022-05-24T17:08:34Z
null
['CVE-2020-0767']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0674, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0767'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6375'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6375/commits/161c8957913ffb48bddef4423998b2eb642f35b3'}, {'type': 'PACKAGE', 'url': 'https...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:10:32Z', 'nvd_published_at': '2020-02-11T22:15:00Z'}
1.4.0
GHSA-x3jr-pf6g-c48f
2023-08-01T23:32:27Z
2022-05-24T16:46:15Z
null
['CVE-2019-11841']
Golang/crypto message forgery vulnerability
A message-forgery issue was discovered in crypto/openpgp/clearsign/clearsign.go in supplementary Go cryptography libraries 2019-03-25. According to the OpenPGP Message Format specification in RFC 4880 chapter 7, a cleartext signed message can contain one or more optional "Hash" Armor Headers. The "Hash" Armor Header sp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto/openpgp/clearsign'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11841'}, {'type': 'WEB', 'url': 'https://github.com/golang/crypto/commit/c05e17bb3b2dca130fc919668a96b4bec9eb9442'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/crypto/tree/master/openpgp/clearsign'}, {'type': 'WEB', 'url': 'https://go-re...
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:32:27Z', 'nvd_published_at': '2019-05-22T17:29:00Z'}
1.4.0
GHSA-hrg5-737c-2p56
2022-05-24T22:08:20Z
2022-05-24T22:08:20Z
null
['CVE-2022-29197']
Missing validation causes denial of service via `UnsortedSegmentJoin`
### Impact The implementation of [`tf.raw_ops.UnsortedSegmentJoin`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/unsorted_segment_join_op.cc#L92-L95) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trig...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hrg5-737c-2p56'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29197'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/13d38a07ce9143e044aa737cfd7bb759d0e9b400'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:08:20Z', 'nvd_published_at': '2022-05-20T22:16:00Z'}
1.4.0
GHSA-cvj7-5f3c-9vg9
2022-05-24T22:21:10Z
2022-05-24T22:21:10Z
null
['CVE-2022-29219']
AttesterSlashing number overflow
### Impact Possible consensus split given maliciously-crafted `AttesterSlashing` or `ProposerSlashing` being included on-chain. Since we represent `uint64` values as native javascript `number`s, there is an issue when those variables with large (greater than 2^53) `uint64` values are included on chain. In those cases...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@chainsafe/lodestar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ChainSafe/lodestar/security/advisories/GHSA-cvj7-5f3c-9vg9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29219'}, {'type': 'WEB', 'url': 'https://github.com/ChainSafe/lodestar/pull/3977'}, {'type': 'PACKAGE', 'url': 'https://github.com/ChainSafe/lo...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:21:10Z', 'nvd_published_at': '2022-05-24T15:15:00Z'}
1.4.0
GHSA-vrmw-2xhq-hrmp
2023-08-22T14:34:11Z
2022-05-24T17:21:23Z
null
['CVE-2020-10740']
Wildfly Unsafe Deserialization Vulnerability
A vulnerability was found in Wildfly in versions before 20.0.0.Final, where a remote deserialization attack is possible in the Enterprise Application Beans(EJB) due to lack of validation/filtering capabilities in wildfly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.0.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10740'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10740'}, {'type': 'PACKAGE', 'url': 'https://github.com/wildfly/wildfly'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T18:27:47Z', 'nvd_published_at': '2020-06-22T18:15:00Z'}
1.4.0
GHSA-8prc-58j4-m55q
2023-08-01T22:43:19Z
2022-05-24T16:58:47Z
null
['CVE-2019-14832']
Keycloak Unauthenticated Access
A flaw was found in the Keycloak REST API before version 8.0.0, implemented in Keycloak before 7.0.1 where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-model-infinispan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-model-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14832'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/0b73685ccf3181115ae3936a578708630215ac23'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14832'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:43:19Z', 'nvd_published_at': '2019-10-15T19:15:00Z'}
1.4.0
GHSA-w598-25hm-jqx3
2022-12-22T14:00:39Z
2022-05-24T17:12:40Z
null
['CVE-2020-2166']
RCE vulnerability in Jenkins Pipeline: AWS Steps Plugin
Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to Pipeline: AWS Steps Plugin’s build steps. Pipeline: AWS Steps Plugin 1.41 ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'de.taimos:pipeline-aws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.41'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2166'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-aws-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1741'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T14:00:39Z', 'nvd_published_at': '2020-03-25T17:15:00Z'}
1.4.0
GHSA-p77r-c6m3-gj2r
2023-07-25T21:30:51Z
2022-05-14T03:09:04Z
null
['CVE-2018-11647']
oauth2orize-fprm XSS vulnerability
index.js in oauth2orize-fprm before 0.2.1 has XSS via a crafted URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'oauth2orize-fprm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11647'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/oauth2orize-fprm/commit/2bf9faee787eb004abbdfb6f4cc2fb06653defd5'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/oauth2orize-fprm/blob/master/SECURITY-NOTICE.md'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:30:51Z', 'nvd_published_at': '2018-06-17T16:29:00Z'}
1.4.0
GHSA-p76j-5v6v-6c22
2022-11-01T22:35:11Z
2022-05-14T03:16:19Z
null
['CVE-2018-1310']
Apache NiFi JMS Deserialization issue
Apache NiFi JMS Deserialization issue because of ActiveMQ client vulnerability. Malicious JMS content could cause denial of service. See ActiveMQ CVE-2015-5254 announcement for more information. The fix to upgrade the activemq-client library to 5.15.3 was applied on the Apache NiFi 1.6.0 release. Users running a prior ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1310'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018-1310'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:35:11Z', 'nvd_published_at': '2018-05-23T14:29:00Z'}
1.4.0
GHSA-wxqg-fg7v-mmc6
2023-08-17T22:32:04Z
2022-05-13T01:05:39Z
null
['CVE-2013-3630']
Moodle Authenticated Spelling Binary Remote Code Execution
Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3630'}, {'type': 'WEB', 'url': 'https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one'}, {'type': 'WEB', 'url': 'https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats'}...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:32:04Z', 'nvd_published_at': '2013-11-01T02:55:00Z'}
1.4.0
GHSA-9g8w-pjpr-prr4
2022-11-04T20:36:05Z
2022-05-13T01:36:55Z
null
['CVE-2017-2594']
Path Traversal in io.hawt:project
hawtio before versions 2.0-beta-1, 2.0-beta-2, 2.0-m1, 2.0-m2, 2.0-m3, and 1.5 are vulnerable to a path traversal that leads to a NullPointerException with a full stacktrace. An attacker could use this flaw to gather undisclosed information from within hawtio's root.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.hawt:project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2594'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2594'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:36:05Z', 'nvd_published_at': '2018-05-08T17:29:00Z'}
1.4.0
GHSA-625g-gx8c-xcmg
2023-08-16T21:44:35Z
2022-05-14T02:09:22Z
null
['CVE-2014-0482']
Django Middleware Enables Session Hijacking
The `contrib.auth.middleware.RemoteUserMiddleware` middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the `contrib.auth.backends.RemoteUserBackend` backend, allows remote authenticated users to hijack web sessions via vectors related to the `REMOTE...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.9'}]}]}, {'package': {'ecosystem': 'PyP...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0482'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/0268b855f9eab3377f2821164ef3e66037789e09'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/5307ce565fbedb9cc27cbe7c757b41a00438d37c'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:44:35Z', 'nvd_published_at': '2014-08-26T14:55:00Z'}
1.4.0
GHSA-qwrf-gfpj-qvj6
2022-06-08T16:30:51Z
2022-05-24T22:04:04Z
null
['CVE-2022-29188']
Smokescreen SSRF via deny list bypass (square brackets)
### Impact The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/stripe/smokescreen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/stripe/smokescreen/security/advisories/GHSA-qwrf-gfpj-qvj6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29188'}, {'type': 'WEB', 'url': 'https://github.com/stripe/smokescreen/commit/dea7b3c89df000f4072ff9866d61d78e30df6a36'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:04:04Z', 'nvd_published_at': '2022-05-21T00:15:00Z'}
1.4.0
GHSA-8572-5jrg-mx52
2022-11-02T00:41:25Z
2022-05-14T03:57:45Z
null
['CVE-2016-3723']
Exposure of Sensitive Information in Jenkins Core
Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with read access to obtain sensitive plugin installation information by leveraging missing permissions checks in unspecified XML/JSON API endpoints.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3723'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1206'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11'}, {'type': 'WEB', 'url': 'https://www.cloudbees.com/jenkin...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:41:25Z', 'nvd_published_at': '2016-05-17T14:08:00Z'}
1.4.0
GHSA-5v5w-44w6-q5hv
2022-07-01T13:43:01Z
2022-05-17T04:47:27Z
null
['CVE-2014-2829']
Erlang Solutions MongooseIM vulnerable to denial of service (DoS) via crafted XMPP stream
Erlang Solutions MongooseIM through 1.3.1 rev. 2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.
[]
[{'package': {'ecosystem': 'Hex', 'name': 'MongooseIM'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2829'}, {'type': 'WEB', 'url': 'https://github.com/esl/MongooseIM/commit/586d96cc12ef218243a3466354b4d208b5472a6c'}, {'type': 'PACKAGE', 'url': 'https://github.com/esl/MongooseIM/'}, {'type': 'WEB', 'url': 'http://xmpp.org/resources/security-notice...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T13:43:01Z', 'nvd_published_at': '2014-04-11T01:55:00Z'}
1.4.0
GHSA-jr83-vr4j-mp6p
2023-07-28T20:59:59Z
2022-05-14T00:57:47Z
null
['CVE-2016-3954']
web2py exposure of sensitive information
web2py before 2.14.2 allows remote attackers to obtain the session_cookie_key value via a direct request to examples/simple_examples/status. NOTE: this issue can be leveraged by remote attackers to execute arbitrary code using CVE-2016-3957.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'web2py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3954'}, {'type': 'WEB', 'url': 'https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4030-1/'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:59:59Z', 'nvd_published_at': '2018-02-06T18:29:00Z'}
1.4.0
GHSA-hch9-6qrj-5f49
2022-12-06T21:29:48Z
2022-05-24T16:59:36Z
null
['CVE-2019-10469']
Jenkins Kubernetes CI/CD Plugin vulnerable to Improper Authorization
A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. ## Note: Jenkins has suspended distri...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.elasticbox.jenkins-ci.plugins:kubernetes-ci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10469'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-ci-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/kubernetes-...
{'cwe_ids': ['CWE-276', 'CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:29:48Z', 'nvd_published_at': '2019-10-23T13:15:00Z'}
1.4.0
GHSA-3w5p-jhp5-c29q
2022-10-21T21:05:54Z
2022-05-24T17:18:28Z
null
['CVE-2020-1108']
.NET Core & .NET Framework Denial of Service Vulnerability
A denial of service vulnerability exists when .NET Core or .NET Framework improperly handles web requests, aka '.NET Core & .NET Framework Denial of Service Vulnerability'.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1108'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/157'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1108'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-21T21:05:54Z', 'nvd_published_at': '2020-05-21T23:15:00Z'}
1.4.0
GHSA-jx66-5ww9-m6q4
2022-06-21T20:13:38Z
2022-05-24T19:11:39Z
null
['CVE-2021-28490']
Cross-Site Request Forgery in OWASP CSRFGuard
In OWASP CSRFGuard through 3.1.0, CSRF can occur because the CSRF cookie may be retrieved by using only a session token.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp:csrfguard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28490'}, {'type': 'PACKAGE', 'url': 'https://github.com/OWASP/www-project-csrfguard'}, {'type': 'WEB', 'url': 'https://github.com/reidmefirst/vuln-disclosure/blob/main/2021-01.txt'}, {'type': 'WEB', 'url': 'https://owasp.org/www-project-csrfguard/'...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:13:38Z', 'nvd_published_at': '2021-08-19T19:15:00Z'}
1.4.0
GHSA-r9pc-g29w-f86j
2023-07-28T21:53:52Z
2022-05-13T01:12:38Z
null
['CVE-2016-2190']
Moodle sensitive information disclosure
Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 does not properly restrict links, which allows remote attackers to obtain sensitive URL information by reading a Referer log.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7'}, {'fixed': '2.7.13'}]}]},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2190'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=330181'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210801130148/http://www.securitytracker.com/id/1035333'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T21:53:52Z', 'nvd_published_at': '2016-05-22T20:59:00Z'}
1.4.0
GHSA-7q56-mp4c-gggg
2022-07-06T19:44:12Z
2022-05-17T03:35:31Z
null
['CVE-2016-5393']
Improper Access Control in Apache Hadoop
In Apache Hadoop 2.6.x before 2.6.5 and 2.7.x before 2.7.3, a remote user who can authenticate with the HDFS NameNode can possibly run arbitrary commands with the same privileges as the HDFS service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5393'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/hadoop-general/201611.mbox/%3CCAA0W1bTbUmUUSF1rjRpX-2DvWutcrPt7TJSWUcSLg1F0gyHG1Q%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/94574'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:44:12Z', 'nvd_published_at': '2016-11-29T06:59:00Z'}
1.4.0
GHSA-ffqj-6fqr-9h24
2022-06-08T16:29:45Z
2022-05-24T22:17:27Z
null
['CVE-2022-29217']
Key confusion through non-blocklisted public key formats
### Impact _What kind of vulnerability is it? Who is impacted?_ Disclosed by Aapo Oksman (Senior Security Specialist, Nixu Corporation). > PyJWT supports multiple different JWT signing algorithms. With JWT, an > attacker submitting the JWT token can choose the used signing algorithm. > > The PyJWT library requires ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyjwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jpadilla/pyjwt/security/advisories/GHSA-ffqj-6fqr-9h24'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29217'}, {'type': 'WEB', 'url': 'https://github.com/jpadilla/pyjwt/commit/9c528670c455b8d948aff95ed50e22940d1ad3fc'}, {'type': 'PACKAGE', 'url': 'h...
{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:17:27Z', 'nvd_published_at': '2022-05-24T15:15:00Z'}
1.4.0
GHSA-qfr3-323w-qv27
2022-05-25T22:40:03Z
2022-05-25T22:40:03Z
null
['CVE-2022-29567']
Possible information disclosure inside TreeGrid component with default data provider
### Description The default configuration of a TreeGrid component uses Object::toString as a key on the client-side and server communication in Vaadin 14.8.5 through 14.8.9, 22.0.6 through 22.0.14, 23.0.0.beta2 through 23.0.8 and 23.1.0.alpha1 through 23.1.0.alpha4, resulting in potential information disclosure of val...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.8.5'}, {'fixed': '14.8.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '22.0.6'}, {'fixed': '22.0.15'}]}]...
[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-qfr3-323w-qv27'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29567'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow-components/pull/3046'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/plat...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:40:03Z', 'nvd_published_at': '2022-05-24T15:15:00Z'}
1.4.0
GHSA-vjxx-54vw-q59f
2023-09-28T20:35:53Z
2022-05-14T01:17:52Z
null
['CVE-2019-6970']
Moodle SSRF Vulnerability
The `edit_blog.php` script allows a registered user to add external RSS feed resources. It was identified that this feature could be abused to be used as a SSRF attack vector by adding a malicious URL/TCP PORT in order to target internal network or an internet hosted server, bypassing firewall rules, IP filtering and m...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6970'}, {'type': 'WEB', 'url': 'https://excellium-services.com/cert-xlm-advisory/cve-2019-6970/'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T20:37:25Z', 'nvd_published_at': '2019-03-21T16:01:00Z'}
1.4.0
GHSA-22jm-p2vv-j2hc
2023-07-31T18:51:11Z
2022-05-14T02:46:11Z
null
['CVE-2016-7136']
Plone XSS
z3c.form in Plone CMS 5.x through 5.0.6 and 4.x through 4.3.11 allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted GET request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'last_affected': '5.0.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'last_affected': '4.3.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7136'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20160830/non-persistent-xss-in-plone-forms'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210625091607/http://www.securityfocus.com/bid/92752'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:51:11Z', 'nvd_published_at': '2017-03-07T16:59:00Z'}
1.4.0
GHSA-86cf-g34f-7462
2023-01-26T23:57:13Z
2022-05-14T03:48:04Z
null
['CVE-2014-4995']
VladTheEnterprising allows local users to obtain sensitive information by reading MySQL root password from temporary file
Race condition in `lib/vlad/dba/mysql.rb` in the VladTheEnterprising gem 0.2 for Ruby allows local users to obtain sensitive information by reading the MySQL root password from a temporary file before it is removed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'VladTheEnterprising'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4995'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/94745'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229054941/http://www.securityfocus.com/bid/68729'}, {'type': 'WEB', 'url': 'http://www.openwall.c...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:57:13Z', 'nvd_published_at': '2018-01-10T18:29:00Z'}
1.4.0
GHSA-36pq-cjh9-fv46
2023-09-20T20:06:13Z
2022-05-14T01:38:21Z
null
['CVE-2019-7170']
Croogo vulnerable to XSS in title field
A stored-self XSS exists in Croogo allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/taxonomy/vocabularies.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7170'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/issues/890'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/commit/cafaaabe2cef3d1d83652370e30563e6ad7c4158'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:39:06Z', 'nvd_published_at': '2019-01-29T18:29:00Z'}
1.4.0
GHSA-mw4r-5mfc-m5vc
2022-12-02T20:12:38Z
2022-05-18T00:00:41Z
null
['CVE-2022-30967']
Cross site scripting in Jenkins Selection tasks Plugin
Jenkins Selection tasks Plugin 1.0 and earlier does not escape the name and description of Script Selection task variable parameters on views displaying parameters. This results in stored cross-site scripting (XSS) vulnerabilities exploitable by attackers with Item/Configure permission. Exploitation of this vulnerabil...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:selection-tasks-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30967'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/selection-tasks-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2717'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:11:31Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-5j25-5hjr-w7m2
2023-09-25T19:17:06Z
2022-05-24T16:52:29Z
null
['CVE-2019-7951']
Magento 2 Community Edition Information Leak
An information leakage vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. A SOAP web service endpoint does not properly enforce parameters related to access control. This could be abused to leak customer information via crafted SOAP requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7951'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:16:57Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-vxf2-7rc3-pxmx
2023-09-18T23:34:20Z
2022-05-01T02:00:38Z
null
['CVE-2005-1632']
Cheetah Path Search Order Hijacking
Cheetah 0.9.15 and 0.9.16 searches the `/tmp` directory for modules before using the paths in the `PYTHONPATH` variable, which allows local users to execute arbitrary code via a malicious module in `/tmp/`.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'cheetah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.15'}, {'last_affected': '0.9.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2005-1632'}, {'type': 'PACKAGE', 'url': 'https://github.com/cheetahtemplate/cheetah'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20050430021153/http://sourceforge.net/mailarchive/forum.php?thread_id=7070332&forum_id=1542'}]
{'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T23:34:20Z', 'nvd_published_at': '2005-05-17T04:00:00Z'}
1.4.0
GHSA-p56j-x44h-g66j
2022-06-28T22:57:34Z
2022-05-24T16:51:50Z
null
['CVE-2019-10355']
Incorrect Privilege Assignment in Jenkins Script Security Plugin
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of type casts allowed attackers to execute arbitrary code in sandboxed scripts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.62'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.61'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10355'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/script-security-plugin/commit/5dc2e2465f309c772237a4b2de9caf61ba9b585b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2594'}, {'type': 'WEB', 'url': 'https://acces...
{'cwe_ids': ['CWE-266'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:57:34Z', 'nvd_published_at': '2019-07-31T13:15:00Z'}
1.4.0
GHSA-m8x2-4gc8-9v3r
2022-12-12T17:01:53Z
2022-05-14T02:56:39Z
null
['CVE-2018-1000605']
Jenkins CollabNet Plugin man in the middle vulnerability
A man in the middle vulnerability exists in Jenkins CollabNet Plugin 2.0.4 and earlier in CollabNetApp.java, CollabNetPlugin.java, CNFormFieldValidator.java that allows attackers to impersonate any service that Jenkins connects to. CollabNet Plugin 2.0.5 and newer no longer does that. It instead requires users to opt i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:collabnet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000605'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/collabnet-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-25/#SECURITY-941'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T17:01:53Z', 'nvd_published_at': '2018-06-26T17:29:00Z'}
1.4.0
GHSA-9gcf-pq99-rjw3
2023-08-16T22:49:38Z
2022-05-17T01:27:10Z
null
['CVE-2014-1604']
RPLY Predictable Tmpfile Names Allows Cache Spoofing
The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'RPLY'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1604'}, {'type': 'WEB', 'url': 'https://github.com/alex/rply/commit/fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/90593'}, {'type': 'WEB', 'url': 'http://bugs.debian.org/cgi...
{'cwe_ids': ['CWE-377'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:49:38Z', 'nvd_published_at': '2014-01-28T00:55:00Z'}
1.4.0
GHSA-9qpf-v72j-j9qh
2023-07-26T21:31:36Z
2022-05-14T01:06:51Z
null
['CVE-2017-11909']
ChakraCore RCE Vulnerability
ChakraCore and Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-201...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11909'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4411'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/0e4566a4c394cb69834719704a05aa17101ae3f5'}, {'type': 'WEB', 'url': 'https://portal.msrc...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T21:31:36Z', 'nvd_published_at': '2017-12-12T21:29:00Z'}
1.4.0
GHSA-3p6c-9xhm-8x7h
2023-07-25T23:29:04Z
2022-05-13T01:24:44Z
null
['CVE-2017-1000193']
October CMS XSS
October CMS build 412 is vulnerable to stored XSS in brand logo image name resulting in JavaScript code execution in the victim's browser.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'october/october'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.412'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000193'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/compare/v1.0.412...v1.0.413#diff-66d6dfe5e11488e1afefcb69b8bdaabfR31'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T23:29:04Z', 'nvd_published_at': '2017-11-17T02:29:00Z'}
1.4.0
GHSA-hx53-635r-vmv8
2022-12-16T22:20:54Z
2022-05-24T17:35:09Z
null
['CVE-2020-2323']
Missing permission checks in Jenkins Chaos Monkey Plugin
Chaos Monkey Plugin 0.4 and earlier does not perform permission checks in an HTTP endpoint. This allows attackers with Overall/Read permission to access the Chaos Monkey page and to see the history of actions. Chaos Monkey Plugin 0.4.1 requires Overall/Administer permission to access the Chaos Monkey page and to see ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:chaos-monkey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2323'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/chaos-monkey-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2109%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T22:20:54Z', 'nvd_published_at': '2020-12-03T16:15:00Z'}
1.4.0
GHSA-g78x-xmv8-23xp
2022-07-01T21:53:08Z
2022-05-14T01:04:36Z
null
['CVE-2017-1000399']
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /queue/item/(ID)/api showed information about tasks in the queue (typically builds waiting to start). This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.73.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.73.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000399'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/3ff432ace14d8f4544c88a179a2f7a962eb98ba6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenk...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:53:08Z', 'nvd_published_at': '2018-01-26T02:29:00Z'}
1.4.0
GHSA-6qx9-rf9g-7jmr
2022-07-06T21:03:48Z
2022-05-17T04:12:57Z
null
['CVE-2014-8125']
Improper Input Validation in Drools and jBPM
XML external entity (XXE) vulnerability in Drools and jBPM before 6.2.0 allows remote attackers to read arbitrary files or possibly have other unspecified impact via a crafted BPMN2 file.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.drools:drools-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.2.0.CR4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jbpm:jbpm-bpmn2'}, 'ranges': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8125'}, {'type': 'WEB', 'url': 'https://github.com/droolsjbpm/drools/commit/c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3'}, {'type': 'WEB', 'url': 'https://github.com/droolsjbpm/jbpm/commit/713e8073ecf45623cfc5c918c5cbf700203f46e5'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:03:48Z', 'nvd_published_at': '2015-04-21T17:59:00Z'}
1.4.0
GHSA-9hg5-7hwc-v434
2022-11-04T22:32:10Z
2022-05-24T17:05:08Z
null
['CVE-2019-6035']
Athenz vulnerable to Open Redirect
Open redirect vulnerability in Athenz v1.8.24 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.yahoo.athenz:athenz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.25'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6035'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/athenz/pull/700'}, {'type': 'WEB', 'url': 'https://github.com/AthenZ/athenz/commit/c4dc89b31fda501af45c20b33db620a077079744'}, {'type': 'PACKAGE', 'url': 'https://github.com/AthenZ/athenz'}, ...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T22:32:10Z', 'nvd_published_at': '2019-12-26T16:15:00Z'}
1.4.0
GHSA-3mxq-v9rw-m6x9
2023-09-25T19:15:31Z
2022-05-24T16:52:28Z
null
['CVE-2019-7944']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting vulnerability exists in the product comments field of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with privileges to the Return Product comments fiel...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7944'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220127030535/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-24'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T18:40:34Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-pvm9-288c-v5wq
2022-11-03T23:37:06Z
2022-05-17T03:42:18Z
null
['CVE-2016-3082']
Remote Code Execution in Apache Struts
XSLTResult allows for the location of a stylesheet being passed as a request parameter. In some circumstances this can be used to inject remotely executable code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.20.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.24'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3082'}, {'type': 'WEB', 'url': 'http://struts.apache.org/docs/s2-031.html'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:37:06Z', 'nvd_published_at': '2016-04-26T14:59:00Z'}
1.4.0
GHSA-mrgh-6x42-x6xf
2022-07-13T15:56:19Z
2022-05-17T05:13:24Z
null
['CVE-2012-4446']
Improper Authentication in Apache Qpid
The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4446'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=851355'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/QPID-4631'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0561.html'}, {'type': 'W...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:56:19Z', 'nvd_published_at': '2013-03-14T03:10:00Z'}
1.4.0
GHSA-qxf8-8837-hq7w
2022-06-01T19:43:45Z
2022-05-13T01:15:07Z
null
['CVE-2019-1003031']
Script security sandbox bypass in Matrix Project Plugin
A sandbox bypass vulnerability exists in Jenkins Matrix Project Plugin 1.13 and earlier in pom.xml, src/main/java/hudson/matrix/FilterScript.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:matrix-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003031'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0739'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/matrix-project-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-03-06/#SECURIT...
{'cwe_ids': ['CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:43:45Z', 'nvd_published_at': '2019-03-08T21:29:00Z'}
1.4.0
GHSA-q446-82vq-w674
2022-07-06T19:44:21Z
2022-05-13T01:09:33Z
null
['CVE-2016-5725']
Improper Limitation of a Pathname to a Restricted Directory in JCraft JSch
Directory traversal vulnerability in JCraft JSch before 0.1.54 on Windows, when the mode is ChannelSftp.OVERWRITE, allows remote SFTP servers to write to arbitrary files via a ..\ (dot dot backslash) in a response to a recursive GET command.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.jcraft:jsch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.54'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.1.53'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5725'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3115'}, {'type': 'WEB', 'url': 'https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-5725'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:44:21Z', 'nvd_published_at': '2017-01-19T22:59:00Z'}
1.4.0
GHSA-c4mc-49hq-q275
2023-08-29T21:02:11Z
2022-05-14T00:56:45Z
null
['CVE-2012-1906']
Puppet uses predictable filenames, allowing arbitrary file overwrite
Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 uses predictable file names when installing Mac OS X packages from a remote source, which allows local users to overwrite arbitrary files or install arbitrary packages via a symlink attack...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6'}, {'fixed': '2.6.15'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1906'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/f7829ec1f1b2c3def8e0eda09c22c3c1fed3a27f'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/74793'}, {'type': 'WEB', 'url': 'https://github.com...
{'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:02:11Z', 'nvd_published_at': '2012-05-29T20:55:00Z'}
1.4.0
GHSA-vcmm-ppqx-95ch
2023-07-28T20:52:56Z
2022-05-14T00:58:12Z
null
['CVE-2016-1000221']
Logstash Logs Sensitive Information
Logstash prior to version 2.3.4, Elasticsearch Output plugin would log to file HTTP authorization headers which could contain sensitive information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'logstash-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000221'}, {'type': 'PACKAGE', 'url': 'https://github.com/elastic/logstash'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124065200/http://www.securityfocus.com/bid/99126'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/secu...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:52:56Z', 'nvd_published_at': '2017-06-16T21:29:00Z'}
1.4.0
GHSA-cj2f-96jq-phpp
2023-07-31T18:33:51Z
2022-05-14T02:46:24Z
null
['CVE-2016-3109']
Shopware RCE Vulnerability
The `backend/Login/load/` script in Shopware before 5.1.5 allows remote attackers to execute arbitrary code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3109'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/d73e9031a5b2ab6e918eb86d1e2b2e873cd3558d'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200814090044/http://www.securityfocus.com/archive/1/538173/100/0/threaded'...
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:33:51Z', 'nvd_published_at': '2017-04-21T20:59:00Z'}
1.4.0
GHSA-9wr9-fw9v-8fgr
2023-09-26T19:17:22Z
2022-05-24T17:00:27Z
null
['CVE-2019-8141']
Magento 2 Community Edition RCE Vulnerability
A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. An authenticated user with administrative privileges (system level import) can execute arbitrary code through a Phar deserialization vulnerability in the import functionality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8141'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:07:22Z', 'nvd_published_at': '2019-11-06T00:15:00Z'}
1.4.0
GHSA-5wpj-c6f7-24x8
2022-05-24T22:13:59Z
2022-05-24T22:13:59Z
null
['CVE-2022-29207']
Undefined behavior when users supply invalid resource handles
### Impact Multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid: ```python import tensorflow as tf tf.raw_ops.QueueIsClosedV2(handle=[]) ``` ```python import tensorflow as tf tf.summary.flush(writer=()) ``` In graph mode, it would have been impossible to per...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5wpj-c6f7-24x8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29207'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a5b89cd68c02329d793356bda85d079e9e69b4e7'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-20', 'CWE-475'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:13:59Z', 'nvd_published_at': '2022-05-20T22:16:00Z'}
1.4.0
GHSA-43q7-q5vp-3g68
2022-11-03T23:45:57Z
2022-05-14T02:59:22Z
null
['CVE-2018-14371']
Path Traversal in Eclipse Mojarra
The getLocalePrefix function in ResourceManager.java in Eclipse Mojarra before 2.3.7 is affected by Directory Traversal via the loc parameter. A remote attacker can download configuration files or Java bytecodes from applications.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.glassfish:mojarra-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14371'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/mojarra/pull/4384'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/mojarra/commit/1b434748d9239f42eae8aa7d37d7a0930c061e24'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:45:57Z', 'nvd_published_at': '2018-07-18T12:29:00Z'}
1.4.0
GHSA-v49x-8hvm-q347
2022-11-03T21:08:10Z
2022-05-14T01:29:43Z
null
['CVE-2018-1306']
Exposure of Sensitive Information in Apache Pluto
The PortletV3AnnotatedDemo Multipart Portlet war file code provided in Apache Pluto version 3.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to restrict path information provided during a file upload. An attacker could exploit this vulnerability to obtain configuration data and...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.pluto:pluto-container'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1306'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/portals-pluto'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45396/'}, {'type': 'WEB', 'url': 'http://portals.apache.org/pluto/security.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T21:08:10Z', 'nvd_published_at': '2018-06-27T18:29:00Z'}
1.4.0
GHSA-xv69-6rf3-w5g2
2022-12-15T17:26:41Z
2022-05-24T17:45:45Z
null
['CVE-2021-21631']
Missing permission check in Jenkins Cloud Statistics Plugin
Cloud Statistics Plugin 0.26 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission and knowledge of random activity IDs to view related provisioning exception error messages. Cloud Statistics Plugin 0.27 requires Overall/Administer permission to access...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloud-stats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.26'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21631'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cloud-stats-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2246'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security...
{'cwe_ids': ['CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:26:41Z', 'nvd_published_at': '2021-03-30T12:16:00Z'}
1.4.0
GHSA-mmhr-3jr7-qj2p
2023-05-24T14:56:44Z
2022-05-14T02:01:18Z
null
['CVE-2018-15121']
Auth0-ASPNET and Auth0-ASPNET-Owin vulnerable to Cross-Site Request Forgery
An issue was discovered in Auth0 auth0-aspnet and auth0-aspnet-owin. Affected packages do not use or validate the state parameter of the OAuth 2.0 and OpenID Connect protocols. This leaves applications vulnerable to CSRF attacks during authentication and authorization operations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Auth0-ASPNET-Owin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'auth0-aspnet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15121'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2018-15121'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/auth0-aspnet-owin'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Auth0-ASPNET-Owin'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T14:56:44Z', 'nvd_published_at': '2018-08-29T03:29:00Z'}
1.4.0
GHSA-52wr-3vww-rmpq
2023-08-16T23:29:45Z
2022-05-17T04:44:24Z
null
['CVE-2014-3242']
SOAPpy vulnerable to XML External Entity attacks
SOAPpy 0.12.5 allows remote attackers to read arbitrary files via a SOAP request containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'SOAPpy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3242'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiorky/soappy'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150501220613/http://www.pnigos.com/?p=260'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229062311/http://www...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:29:45Z', 'nvd_published_at': '2014-05-12T14:55:00Z'}
1.4.0
GHSA-c2gg-rrhc-fvvg
2023-07-17T21:00:15Z
2022-05-24T16:52:25Z
null
['CVE-2019-7886']
Magento 2 Community Edition Cryptographic Flaw
A cryptograhic flaw exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. A weak cryptograhic mechanism is used to generate the intialization vector in multiple security relevant contexts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7886'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121011306/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-33'}]
{'cwe_ids': ['CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T21:00:15Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-c252-xc8v-mqmm
2023-07-31T23:42:03Z
2022-05-13T01:25:27Z
null
['CVE-2015-2067']
MAGMI plugin for Magento Server Directory Traversal
Directory traversal vulnerability in web/ajax_pluginconf.php in the MAGMI (aka Magento Mass Importer) plugin for Magento Server allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'dweeves/magmi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.21'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2067'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210122162452/http://www.securityfocus.com/bid/74881'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/130250/Magento-Server-MAGMI-Cross-Site-Scripting-Local-File-Inclusion....
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T23:42:03Z', 'nvd_published_at': '2015-02-24T17:59:00Z'}
1.4.0
GHSA-82v2-f875-73g9
2023-09-26T16:35:36Z
2022-05-24T16:58:43Z
null
['CVE-2019-14838']
Wildfly Authorization Misconfiguration
A flaw was found in wildfly-core before 7.2.5.GA. The Management users with Monitor, Auditor and Deployer Roles should not be allowed to modify the runtime state of the server
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.core:wildfly-host-controller'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.5.GA'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14838'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly-core/pull/3981'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly-core/commit/131fa6880ae1523fac9e96df54dc394b63b0eed3'}, {'type': 'WEB', 'url': 'https://access.redhat.c...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:50:01Z', 'nvd_published_at': '2019-10-14T15:15:00Z'}
1.4.0
GHSA-mw5w-cf76-73m8
2023-07-17T20:36:37Z
2022-05-24T16:52:26Z
null
['CVE-2019-7895']
Magento 2 Community Edition RCE Vulnerability
A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with admin privileges to layouts can execute arbitrary code through a crafted XML layout update.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7895'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:36:37Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-h22x-hm8g-rxpg
2022-07-01T20:36:40Z
2022-05-17T00:29:00Z
null
['CVE-2017-12620']
Improper Restriction of XML External Entity Reference in Apache OpenNLP
When loading models or dictionaries that contain XML it is possible to perform an XXE attack, since Apache OpenNLP is a library, this only affects applications that load models or dictionaries from untrusted sources. The versions 1.5.0 to 1.5.3, 1.6.0, 1.7.0 to 1.7.2, 1.8.0 to 1.8.1 of Apache OpenNLP are affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.opennlp:opennlp-tools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12620'}, {'type': 'WEB', 'url': 'http://opennlp.apache.org/news/cve-2017-12620.html'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T20:36:40Z', 'nvd_published_at': '2017-10-03T01:29:00Z'}
1.4.0
GHSA-r3pq-mp8v-cp33
2023-08-29T21:41:11Z
2022-05-17T05:12:26Z
null
['CVE-2012-4345']
phpMyAdmin Multiple Cross-site Scripting Vulnerabilities in the Database Structure page
Multiple cross-site scripting (XSS) vulnerabilities in the Database Structure page in phpMyAdmin 3.4.x before 3.4.11.1 and 3.5.x before 3.5.2.2 allow remote authenticated users to inject arbitrary web script or HTML via (1) a crafted table name during table creation, or a (2) Empty link or (3) Drop link for a crafted t...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4'}, {'fixed': '3.4.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'aff...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4345'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150523055725/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2012:136/?name=MDVSA-2012:136'}, {'type': 'WEB', 'url': 'http://www.phpmyadmin.net/home_page/security/P...
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:41:11Z', 'nvd_published_at': '2012-08-21T23:55:00Z'}
1.4.0
GHSA-5h9g-8xcv-qjq9
2022-06-21T20:11:43Z
2022-05-24T19:17:42Z
null
['CVE-2021-3878']
Improper Restriction of XML External Entity Reference in Stanford CoreNLP
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'edu.stanford.nlp:stanford-corenlp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3878'}, {'type': 'WEB', 'url': 'https://github.com/stanfordnlp/corenlp/commit/e5bbe135a02a74b952396751ed3015e8b8252e99'}, {'type': 'PACKAGE', 'url': 'https://github.com/stanfordnlp/CoreNLP'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a11c8...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:11:43Z', 'nvd_published_at': '2021-10-15T14:15:00Z'}
1.4.0
GHSA-45w3-2hvv-pfxq
2022-07-07T23:22:41Z
2022-05-17T04:39:49Z
null
['CVE-2013-6408']
XML Injection in Apache Solr
The DocumentAnalysisRequestHandler in Apache Solr before 4.3.1 does not properly use the EmptyEntityResolver, which allows remote attackers to have an unspecified impact via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. NOTE: ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6408'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-4881'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1844.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0029.html'}, {'type': 'WEB...
{'cwe_ids': ['CWE-91'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:22:41Z', 'nvd_published_at': '2013-12-07T20:55:00Z'}