schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 14
228
| details
stringlengths 48
1.45k
| severity
stringlengths 2
78
| affected
stringlengths 79
6.96k
| references
stringlengths 143
6.38k
| database_specific
stringlengths 131
174
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-7f42-p84j-f58p | 2023-01-23T20:47:11Z | 2018-03-21T11:56:32Z | null | ['CVE-2018-3740'] | Sanitize vulnerable to Improper Input Validation and Cross-site Scripting | When Sanitize <= 4.6.2 is used in combination with libxml2 >= 2.9.2, a specially crafted HTML fragment can cause libxml2 to generate improperly escaped output, allowing non-whitelisted attributes to be used on whitelisted elements.
This can allow HTML and JavaScript injection, which could result in XSS if Sanitize's output is served to browsers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sanitize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3740'}, {'type': 'WEB', 'url': 'https://github.com/rgrove/sanitize/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e'}, {'type': 'WEB', 'url': 'https://github.com/rgrove/sanitize/commit/93feeb38e21864146bb29191792b971dbe1ec62e'}, {'type': 'WEB', 'url': 'https://about.gitlab.com/2018/06/25/security-release-gitlab-11-dot-0-dot-1-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com/rgrove/sanitize'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sanitize/CVE-2018-3740.yml'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4358'}] | {'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:33Z', 'nvd_published_at': '2018-03-30T19:29:00Z'} |
1.4.0 | GHSA-x7rv-cr6v-4vm4 | 2023-07-05T20:45:55Z | 2018-03-21T11:57:11Z | null | ['CVE-2018-8048'] | Cross-site Scripting in loofah | Loofah allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments.
Users are affected if running Loofah < 2.2.1, but only:
* when running on MRI or RBX,
* in combination with libxml2 >= 2.9.2.
JRuby users are not affected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8048'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/issues/144'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/pull/1746'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/commit/f739cf8eac5851f328b8044281d6653f74eff116'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x7rv-cr6v-4vm4'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2018-8048.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-8048.yml'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191122-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4171'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2018/03/19/5'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hwhh-2fwm-cfgw | 2022-04-26T17:36:10Z | 2018-03-13T20:44:48Z | null | ['CVE-2018-1000088'] | Doorkeeper is vulnerable to stored XSS and code execution | Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link. This vulnerability appears to have been fixed in 4.2.6, 4.3.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '4.2.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000088'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/issues/969'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/pull/970'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/pull/328/files'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/commit/7b1a8373ecd69768c896000c7971dbf48948c1b5'}, {'type': 'WEB', 'url': 'https://blog.justinbull.ca/cve-2018-1000088-stored-xss-in-doorkeeper/'}, {'type': 'PACKAGE', 'url': 'https://github.com/doorkeeper-gem/doorkeeper'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.3.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/doorkeeper/CVE-2018-1000088.yml'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6wpv-cj6x-v3jw | 2023-01-25T23:04:00Z | 2018-03-13T16:15:57Z | null | ['CVE-2015-1828'] | http vulnerable to Exposure of Sensitive Information to an Unauthorized Actor | The Ruby http gem before 0.7.3 does not verify hostnames in SSL connections, which might allow remote attackers to obtain sensitive information via a man-in-the-middle-attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1828'}, {'type': 'WEB', 'url': 'https://github.com/ruby/openssl/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/http/CVE-2015-1828.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/httprb/jkb4oxwZjkU'}, {'type': 'WEB', 'url': 'https://rubysec.com/advisories/http-CVE-2015-1828'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7h42-5vj2-cq39 | 2023-09-13T22:19:39Z | 2018-03-13T20:42:00Z | null | ['CVE-2018-1000096'] | tiny-json-http missing SSL certificate validation | brianleroux tiny-json-http version all versions since commit [9b8e74a232bba4701844e07bcba794173b0238a8](https://github.com/brianleroux/tiny-json-http/commit/9b8e74a232bba4701844e07bcba794173b0238a8) (Oct 29 2016) contains a Missing SSL certificate validation vulnerability in The libraries core functionality is affected. that can result in Exposes the user to man-in-the-middle attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'tiny-json-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.1'}, {'fixed': '7.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000096'}, {'type': 'WEB', 'url': 'https://github.com/brianleroux/tiny-json-http/pull/15'}, {'type': 'WEB', 'url': 'https://github.com/brianleroux/tiny-json-http/commit/3c1e36d8bef3ef5fd8e4447f816d5ffe2bfc3190'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7h42-5vj2-cq39'}, {'type': 'PACKAGE', 'url': 'https://github.com/brianleroux/tiny-json-http'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fjqr-fx3f-g4rv | 2022-04-26T14:35:22Z | 2018-03-26T16:41:20Z | null | ['CVE-2018-1000118'] | Electron protocol handler browser vulnerable to Command Injection | Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electron 1.8.2-beta.5. This issue is due to an incomplete fix for CVE-2018-1000006, specifically the black list used was not case insensitive allowing an attacker to potentially bypass it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2-beta5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2-beta4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000118'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7'}, {'type': 'WEB', 'url': 'https://electronjs.org/releases#1.8.2-beta.5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fjqr-fx3f-g4rv'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w7q9-xr2x-wh7x | 2023-08-29T11:24:57Z | 2018-03-05T19:06:00Z | null | ['CVE-2017-12097'] | delayed_job_web Cross-site Scripting vulnerability | An exploitable cross site scripting (XSS) vulnerability exists in the filter functionality of the delayed_job_web rails gem versions 1.2.9 before 1.4.2. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'delayed_job_web'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.9'}, {'fixed': '1.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12097'}, {'type': 'WEB', 'url': 'https://github.com/ejschmitt/delayed_job_web/commit/6bcb10e61ea2b9a44ffa16be8536dff46ad51449'}, {'type': 'PACKAGE', 'url': 'https://github.com/ejschmitt/delayed_job_web'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/delayed_job_web/CVE-2017-12097.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/delayed_job_web/versions/1.4'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227132840/http://www.securityfocus.com/bid/102484'}, {'type': 'WEB', 'url': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0449'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:58Z', 'nvd_published_at': '2018-01-19T20:29:00Z'} |
1.4.0 | GHSA-pxr8-w3jq-rcwj | 2023-07-03T21:59:02Z | 2018-03-05T19:37:23Z | null | ['CVE-2017-12098'] | rails_admin ruby gem XSS | An exploitable cross site scripting (XSS) vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails_admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12098'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pxr8-w3jq-rcwj'}, {'type': 'PACKAGE', 'url': 'https://github.com/railsadminteam/rails_admin/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2017-12098.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210116160904/http://www.securityfocus.com/bid/102486'}, {'type': 'WEB', 'url': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0450'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:19Z', 'nvd_published_at': '2018-01-19T19:29:00Z'} |
1.4.0 | GHSA-446m-mv8f-q348 | 2021-08-31T21:44:15Z | 2018-03-05T18:35:09Z | null | ['CVE-2017-18214'] | Regular Expression Denial of Service in moment | Affected versions of `moment` are vulnerable to a low severity regular expression denial of service when parsing dates as strings.
## Recommendation
Update to version 2.19.3 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.19.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18214'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/issues/4163'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/pull/4326'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/commit/69ed9d44957fa6ab12b73d2ae29d286a857b80eb'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-446m-mv8f-q348'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/moment'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/532'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2019-02'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:13Z', 'nvd_published_at': '2018-03-04T21:29:00Z'} |
1.4.0 | GHSA-pcm6-g2qp-9gw8 | 2023-07-03T23:45:19Z | 2018-03-16T01:13:46Z | null | ['CVE-2014-4992'] | Cap-Strap gem for Ruby places credentials on the useradd command line | lib/cap-strap/helpers.rb in the cap-strap gem 0.1.5 for Ruby places credentials on the useradd command line, which allows local users to obtain sensitive information by listing the process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cap-strap'}, 'versions': ['0.1.5']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4992'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pcm6-g2qp-9gw8'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cap-strap/CVE-2014-4992.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/substantial/cap-strap'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/07/9'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/cap-strap-0.1.5.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rrvx-pwf8-p59p | 2022-04-27T13:29:11Z | 2018-10-17T16:24:22Z | null | ['CVE-2016-1000343'] | In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values | In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000343'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rrvx-pwf8-p59p'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3727-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q35p-chc6-7x57 | 2021-09-16T19:20:04Z | 2018-10-17T19:48:18Z | null | ['CVE-2018-1332'] | Moderate severity vulnerability that affects org.apache.storm:storm-core | Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose a vulnerability that could allow a user to impersonate another user when communicating with some Storm Daemons. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1332'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q35p-chc6-7x57'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/50f1d6a7af27f49d2e498a9ab2975685302cd8ca47000b7c38f339a4@%3Cdev.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104399'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8fx9-5hx8-crhm | 2022-04-26T18:59:36Z | 2018-10-16T19:35:40Z | null | ['CVE-2017-12611'] | Apache Struts 2.0.1 uses an unintentional expression in a Freemarker tag instead of string literal | In Apache Struts 2.0.1 through 2.3.33 and 2.5 through 2.5.10, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.1'}, {'fixed': '2.3.34'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.33'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12611'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8fx9-5hx8-crhm'}, {'type': 'WEB', 'url': 'https://kb.netapp.com/support/s/article/ka51A000000CgttQAC/NTAP-20170911-0001'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-053.html'}, {'type': 'WEB', 'url': 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/100829'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3m2r-q8x3-xmf7 | 2021-12-03T14:27:36Z | 2018-10-16T19:59:48Z | null | [] | Moderate severity vulnerability that affects Microsoft.AspNetCore.All, Microsoft.AspNetCore.Server.Kestrel.Core, Microsoft.AspNetCore.Server.Kestrel.Transport.Abstractions, and Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv | Microsoft made an internal discovery of a security vulnerability in version 2.x of ASP.NET Core where
a specially crafted request can cause excess resource consumption in Kestrel.
| [] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Transport.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/300'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3m2r-q8x3-xmf7'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4fq3-mr56-cg6r | 2022-08-11T21:46:08Z | 2018-10-17T17:23:24Z | null | ['CVE-2018-1273'] | Spring Data Commons remote code injection vulnerability | Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding that can lead to a remote code execution attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1273'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4fq3-mr56-cg6r'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-data-commons'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1273'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/ignite-dev/201807.mbox/%3CCAK0qHnqzfzmCDFFi6c5Jok19zNkVCz5Xb4sU%3D0f2J_1i4p46zQ%40mail.gmail.com%3E'}] | {'cwe_ids': ['CWE-20', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:14Z', 'nvd_published_at': '2018-04-11T13:29:00Z'} |
1.4.0 | GHSA-q66c-h853-gqw2 | 2023-01-18T06:20:33Z | 2018-10-16T19:49:48Z | null | ['CVE-2016-4432'] | AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication | The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-broker-plugins-amqp-0-8-protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-broker-plugins-amqp-1-0-protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4432'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/qpid-broker-j'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/QPID-7257'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1743161'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1743393'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:10Z', 'nvd_published_at': '2016-06-01T20:59:00Z'} |
1.4.0 | GHSA-p8xr-4v2c-rvgp | 2021-06-10T22:05:21Z | 2018-10-18T18:04:50Z | null | ['CVE-2015-1836'] | High severity vulnerability that affects org.apache.hbase:hbase | Apache HBase 0.98 before 0.98.12.1, 1.0 before 1.0.1.1, and 1.1 before 1.1.0.1, as used in IBM InfoSphere BigInsights 3.0, 3.0.0.1, and 3.0.0.2 and other products, uses incorrect ACLs for ZooKeeper coordination state, which allows remote attackers to cause a denial of service (daemon outage), obtain sensitive information, or modify data via unspecified client traffic. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hbase:hbase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.98'}, {'fixed': '0.98.12.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.98.12.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hbase:hbase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.1.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hbase:hbase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.0.1'}]}], 'versions': ['1.1.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1836'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p8xr-4v2c-rvgp'}, {'type': 'WEB', 'url': 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/www-announce/201505.mbox/%3CCA+RK=_CFiTfQ2d0V+kuJx_y5izmYccaKjXaJ3V72KK7tbOhbkg@mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21969546'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1034365'}] | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mwcx-532g-8pq3 | 2022-04-26T18:56:02Z | 2018-10-16T17:44:11Z | null | ['CVE-2018-12538'] | Access and integrity issue within Eclipse Jetty | In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage for the FileSessionDataStore. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.11.v20180605'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.10.v20180503'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12538'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536018'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mwcx-532g-8pq3'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181014-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041194'}] | {'cwe_ids': ['CWE-384', 'CWE-6'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2rcm-phc9-3945 | 2023-08-30T21:59:10Z | 2018-10-10T16:10:23Z | null | ['CVE-2018-1000808'] | Pyopenssl Incorrect Memory Management | It was discovered that pyOpenSSL incorrectly handled memory when performing operations on a PKCS #12 store. A remote attacker could possibly use this issue to cause pyOpenSSL to consume resources, resulting in a denial of service.
This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection that would cause the calling application to reload certificates from a PKCS #12 store. This vulnerability appears to have been fixed in 17.5.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyopenssl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000808'}, {'type': 'WEB', 'url': 'https://github.com/pyca/pyopenssl/pull/723'}, {'type': 'WEB', 'url': 'https://github.com/pyca/pyopenssl/commit/e73818600065821d588af475b024f4eb518c3509'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0085'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2rcm-phc9-3945'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/pyopenssl'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3813-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html'}] | {'cwe_ids': ['CWE-401', 'CWE-404'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:58Z', 'nvd_published_at': '2018-10-08T15:29:00Z'} |
1.4.0 | GHSA-7q9c-h23x-65fq | 2022-09-14T01:01:53Z | 2018-10-18T18:06:22Z | null | ['CVE-2016-4977'] | Spring Security OAuth vulnerable to remote code execution (RCE) via specially crafted request using whitelabel views | When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4977'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7q9c-h23x-65fq'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0841d849c23418c473ccb9183cbf41a317cb0476e44be48022ce3488@%3Cdev.fineract.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37d7e820fc65a768de3e096e98382d5529a52a039f093e59357d0bc0@%3Cdev.fineract.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5e6dd946635bbcc9e1f2591599ad0fab54f2dc3714196af3b17893f2@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/96c017115069408cec5e82ce1e6293facab398011f6db7e1befbe274@%3Cdev.fineract.apache.org%3E'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2016-4977'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/10/16/1'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-568q-9fw5-28wf | 2020-06-16T21:00:08Z | 2018-10-19T16:53:33Z | null | ['CVE-2018-10936'] | Moderate severity vulnerability that affects org.postgresql:pgjdbc-aggregate | A weakness was found in postgresql-jdbc before version 42.2.5. It was possible to provide an SSL Factory and not check the host name if a host name verifier was not provided to the driver. This could lead to a condition where a man-in-the-middle attacker could masquerade as a trusted server by providing a certificate for the wrong host, as long as it was signed by a trusted CA. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:pgjdbc-aggregate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '42.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10936'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10936'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-568q-9fw5-28wf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.postgresql.org/about/news/1883/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105220'}] | {'cwe_ids': ['CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jj9h-mwhq-8vhm | 2023-05-22T21:30:04Z | 2018-10-16T19:50:13Z | null | ['CVE-2016-3094'] | Improper Input Validation in org.apache.qpid:qpid-broker | PlainSaslServer.java in Apache Qpid Java before 6.0.3, when the broker is configured to allow plaintext passwords, allows remote attackers to cause a denial of service (broker termination) via a crafted authentication attempt, which triggers an uncaught exception. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3094'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jj9h-mwhq-8vhm'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/QPID-7271'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1744403'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3C5748641A.2050701%40gmail.com%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/137215/Apache-Qpid-Java-Broker-6.0.2-Denial-Of-Service.html'}, {'type': 'WEB', 'url': 'http://qpid.apache.org/releases/qpid-java-6.0.3/release-notes.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/538507/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1035982'}] | {'cwe_ids': ['CWE-20', 'CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hvwm-2624-rp9x | 2022-11-17T18:56:52Z | 2018-10-30T20:48:58Z | null | ['CVE-2018-8006'] | Apache ActiveMQ web console vulnerable to Cross-site Scripting | An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-web-console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.15.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8006'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hvwm-2624-rp9x'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/activemq'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f1e41bc9153936e065ca3094bd89ff8167ad2d39ac0b410f24382d2@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c0ec53b72b3240b187afb1cf67e4309a9e5f607282010aa196734814@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'http://activemq.apache.org/security-advisories.data/CVE-2018-8006-announcement.txt'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105156'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:09Z', 'nvd_published_at': '2018-10-10T14:29:00Z'} |
1.4.0 | GHSA-r4x2-3cq5-hqvp | 2022-04-27T13:38:42Z | 2018-10-17T16:32:32Z | null | ['CVE-2018-8014'] | The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins | The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.8'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.32'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.53'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.41'}, {'fixed': '7.0.88'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8014'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2469'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2470'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0450'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0451'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1529'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2205'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r4x2-3cq5-hqvp'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181018-0002/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3665-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4596'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-7.html'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-8.html'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-9.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104203'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040998'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041888'}] | {'cwe_ids': ['CWE-1188'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6xh7-4v2w-36q6 | 2022-04-26T19:07:08Z | 2018-10-16T19:58:05Z | null | ['CVE-2017-0247'] | ASP.NET Core fails to properly validate web requests | A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.1'}, {'fixed': '4.1.2'}]}], 'versions': ['4.1.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.1'}, {'fixed': '4.3.2'}]}], 'versions': ['4.3.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.5.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0247'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/239'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6xh7-4v2w-36q6'}, {'type': 'WEB', 'url': 'https://technet.microsoft.com/en-us/library/security/4021279.aspx'}, {'type': 'WEB', 'url': 'https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:41Z', 'nvd_published_at': '2017-05-12T14:29:00Z'} |
1.4.0 | GHSA-fmr4-w67p-vh8x | 2023-02-13T20:36:36Z | 2018-10-19T16:55:35Z | null | ['CVE-2018-1047'] | Improper Input Validation in org.wildfly:wildfly-undertow | A flaw was found in Wildfly 9.x. A path traversal vulnerability through the org.wildfly.extension.undertow.deployment.ServletResourceManager.getResource method could lead to information disclosure of arbitrary local files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-undertow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1047'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1247'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1248'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1249'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1251'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2018-1047'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1528361'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fmr4-w67p-vh8x'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/WFLY-9620'}] | {'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:49:32Z', 'nvd_published_at': '2018-01-24T23:29:00Z'} |
1.4.0 | GHSA-rh6x-qvg7-rrmj | 2023-02-13T20:41:23Z | 2018-10-10T17:23:45Z | null | ['CVE-2016-3096'] | Link Following in ansible | The create_script function in the lxc_container module in Ansible before 1.9.6-1 and 2.x before 2.0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /opt/.lxc-attach-script, (2) the archived container in the archive_path directory, or the (3) lxc-attach-script.log or (4) lxc-attach-script.err files in the temporary directory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.1.0'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.6.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3096'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-modules-extras/pull/1941'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79f5e55361b885b7efed5bec72d4a4'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1322925'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rh6x-qvg7-rrmj'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/v1.9.6-1/CHANGELOG.md#196-dancing-in-the-street---tbd'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/v2.0.2.0-1/CHANGELOG.md#202-over-the-hills-and-far-away'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21topic/ansible-announce/E80HLZilTU0'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21topic/ansible-announce/tqiZbcWxYig'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201607-14'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183103.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183132.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183252.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183274.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184175.html'}] | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:53Z', 'nvd_published_at': '2016-06-03T14:59:00Z'} |
1.4.0 | GHSA-4487-x383-qpph | 2022-06-24T19:57:13Z | 2018-10-17T20:27:47Z | null | ['CVE-2018-1272'] | Possible privilege escalation in org.springframework:spring-core | Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1272'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4487-x383-qpph'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1272'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103697'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:17Z', 'nvd_published_at': '2018-04-06T13:29:00Z'} |
1.4.0 | GHSA-6fvx-r7hx-3vh6 | 2022-04-27T14:25:05Z | 2018-10-17T18:28:00Z | null | ['CVE-2018-15531'] | JavaMelody has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java. | JavaMelody before 1.74.0 has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.bull.javamelody:javamelody-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.74.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15531'}, {'type': 'WEB', 'url': 'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6fvx-r7hx-3vh6'}, {'type': 'PACKAGE', 'url': 'https://github.com/javamelody/javamelody'}, {'type': 'WEB', 'url': 'https://github.com/javamelody/javamelody/wiki/ReleaseNotes'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-09-25/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2018/09/25/3'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x84v-xcm2-53pg | 2022-09-14T21:58:32Z | 2018-10-29T19:06:46Z | null | ['CVE-2018-18074'] | Insufficiently Protected Credentials in Requests | The Requests package through 2.19.1 before 2018-09-14 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.19.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18074'}, {'type': 'WEB', 'url': 'https://github.com/requests/requests/issues/4716'}, {'type': 'WEB', 'url': 'https://github.com/requests/requests/pull/4718'}, {'type': 'WEB', 'url': 'https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2035'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/910766'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x84v-xcm2-53pg'}, {'type': 'PACKAGE', 'url': 'https://github.com/requests/requests'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3790-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3790-2/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://docs.python-requests.org/en/master/community/updates/#release-and-version-history'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html'}] | {'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:40Z', 'nvd_published_at': '2018-10-09T17:29:00Z'} |
1.4.0 | GHSA-8qfc-cvjp-mgpq | 2021-09-07T20:29:22Z | 2018-10-16T20:53:31Z | null | ['CVE-2016-6805'] | Moderate severity vulnerability that affects org.apache.ignite:ignite-core | Apache Ignite before 1.9 allows man-in-the-middle attackers to read arbitrary files via XXE in modified update-notifier documents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ignite:ignite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6805'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8qfc-cvjp-mgpq'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2017/q2/31'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97509'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8w4h-3cm3-2pm2 | 2023-03-01T01:22:59Z | 2018-10-09T00:56:26Z | null | ['CVE-2018-3745'] | Out-of-bounds Read in atob | Versions of `atob` before 2.1.0 uninitialized Buffers when number is passed in input on Node.js 4.x and below.
## Recommendation
Update to version 2.1.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'atob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3745'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/321686'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8w4h-3cm3-2pm2'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230622-0009/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/646'}] | {'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:52Z', 'nvd_published_at': '2018-05-29T20:29:00Z'} |
1.4.0 | GHSA-v7mf-qgxf-qmvf | 2022-04-27T13:49:46Z | 2018-10-17T17:21:54Z | null | ['CVE-2016-8751'] | Apache Ranger admin users can store some arbitrary javascript code to be executed when normal users login and access policies | Apache Ranger before 0.6.is vulnerable to a Stored Cross-Site Scripting in when entering custom policy conditions. Admin users can store some arbitrary javascript code to be executed when normal users login and access policies. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8751'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v7mf-qgxf-qmvf'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99067'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9r24-gp44-h3pm | 2021-09-08T20:54:36Z | 2018-10-17T15:43:43Z | null | ['CVE-2018-1335'] | High severity vulnerability that affects org.apache.tika:tika-core | From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7'}, {'fixed': '1.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1335'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9r24-gp44-h3pm'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b3ed4432380af767effd4c6f27665cc7b2686acccbefeb9f55851dca@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/46540/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104001'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h7j7-pw3v-3v3x | 2021-09-14T15:43:06Z | 2018-10-18T16:49:54Z | null | ['CVE-2018-10912'] | Moderate severity vulnerability that affects org.keycloak:keycloak-core | keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10912'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h7j7-pw3v-3v3x'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j53j-gmr9-h8g3 | 2021-09-14T18:17:53Z | 2018-10-17T15:50:31Z | null | ['CVE-2018-8017'] | Moderate severity vulnerability that affects org.apache.tika:tika-core | In Apache Tika 1.2 to 1.18, a carefully crafted file can trigger an infinite loop in the IptcAnpaParser. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'fixed': '1.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8017'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j53j-gmr9-h8g3'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tika'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/72df7a3f0dda49a912143a1404b489837a11f374dfd1961061873a91@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105513'}] | {'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jv74-f9pj-xp3f | 2022-11-17T19:14:08Z | 2018-10-16T23:07:57Z | null | ['CVE-2018-8041'] | Apache Camel's Mail is vulnerable to path traversal | Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 and 2.22.0 is vulnerable to path traversal. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20.0'}, {'fixed': '2.20.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.21.0'}, {'fixed': '2.21.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.22.0'}, {'fixed': '2.22.1'}]}], 'versions': ['2.22.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8041'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jv74-f9pj-xp3f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-12630'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2018-8041.txt.asc?version=1&modificationDate=1536746339000&api=v2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105352'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v76m-f5cx-8rg4 | 2020-06-16T21:57:07Z | 2018-10-16T19:33:25Z | null | ['CVE-2015-1566'] | Moderate severity vulnerability that affects DotNetNuke.Core | Cross-site scripting (XSS) vulnerability in DotNetNuke (DNN) before 7.4.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1566'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v76m-f5cx-8rg4'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/62832'}, {'type': 'WEB', 'url': 'http://www.dnnsoftware.com/platform/manage/security-center'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m956-frf4-m2wr | 2022-07-15T18:33:52Z | 2018-10-10T17:22:53Z | null | ['CVE-2016-9587'] | Ansible is vulnerable to an improper input validation in Ansible's handling of data sent from client systems | Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.3.0'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0.0'}, {'fixed': '2.2.1.0'}]}], 'versions': ['2.2.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9587'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0448'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0515'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1685'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9587'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m956-frf4-m2wr'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2018-39.yaml'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-77'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/41013/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0195.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0260.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95352'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:38Z', 'nvd_published_at': '2018-04-24T16:29:00Z'} |
1.4.0 | GHSA-6xq8-pvg4-3mf3 | 2022-09-14T19:17:28Z | 2018-10-19T16:54:11Z | null | ['CVE-2018-1000644'] | Eclipse RDF4j vulnerable to XML External Entitiy | Eclipse RDF4j version < 2.4.0 Milestone 2 contains a XML External Entity (XXE) vulnerability in RDF4j XML parser parsing RDF files that can result in the disclosure of confidential data, denial of service, server side request forgery, port scanning. This attack appear to be exploitable via Specially crafted RDF file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.rdf4j:rdf4j-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000644'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/rdf4j/issues/1056'}, {'type': 'WEB', 'url': 'https://0dd.zone/2018/08/05/rdf4j-XXE/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6xq8-pvg4-3mf3'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/rdf4j'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xv6v-72hh-g6g2 | 2020-06-16T22:04:31Z | 2018-10-18T17:22:26Z | 2020-06-16T22:04:31Z | ['CVE-2018-1000643'] | Moderate severity vulnerability that affects org.owasp.antisamy:antisamy | OWASP OWASP ANTISAMY version 1.5.7 and earlier contains a Cross Site Scripting (XSS) vulnerability in AntiSamy.scan() - for both SAX & DOM that can result in Cross Site Scripting. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.antisamy:antisamy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000643'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xv6v-72hh-g6g2'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vq9j-jh62-5hmp | 2022-04-26T21:36:33Z | 2018-10-16T23:13:11Z | null | ['CVE-2017-5643'] | Apache Camel using an outdated vulnerable JSON-lib library | Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.17.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.18.0'}, {'fixed': '2.18.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5643'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vq9j-jh62-5hmp'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2017-5643.txt.asc?version=1&modificationDate=1489652454000&api=v2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97226'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-758m-6g3q-g3hh | 2022-04-27T13:54:27Z | 2018-10-17T17:22:38Z | null | ['CVE-2017-7676'] | Policy resource matcher in Apache Ranger before 0.7.1 ignores characters after '' wildcard character | Policy resource matcher in Apache Ranger before 0.7.1 ignores characters after '*' wildcard character - like my*test, test*.txt. This can result in unintended behavior. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7676'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-758m-6g3q-g3hh'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98958'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3pph-2595-cgfh | 2022-04-27T14:43:36Z | 2018-10-17T19:55:46Z | null | ['CVE-2018-1308'] | There is a XML external entity expansion (XXE) vulnerability in Apache Solr | This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 relates to an XML external entity expansion (XXE) in the `&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'fixed': '6.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1308'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3pph-2595-cgfh'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-11971'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/www-announce/201804.mbox/%3C000001d3cf68%245ac69af0%241053d0d0%24%40apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4194'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qxxx-2pp7-5hmx | 2023-08-28T10:55:45Z | 2018-10-16T17:21:35Z | null | ['CVE-2017-7525'] | jackson-databind is vulnerable to a deserialization flaw | A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.7.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7525'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/1599'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/1723'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1834'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1835'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1836'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1837'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1839'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1840'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2477'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2546'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2547'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2633'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2635'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2636'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2637'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2638'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3141'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3454'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3458'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0294'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0342'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1449'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1450'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0910'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1462702'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-055'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qxxx-2pp7-5hmx'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3c87dc8bca99a2b3b4743713b33d1de05b1d6b761fdf316224e9c81f@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4641ed8616ccc2c1fbddac2c3dc9900c96387bc226eaf0232d61909b@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5008bcbd45ee65ce39e4220b6ac53d28a24d6bc67d5804e9773a7399@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b1f33fe5ade396bb903fdcabe9f243f7692c7dfce5418d3743c2d346@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c2ed4c0126b43e324cf740012a0edd371fd36096fd777be7bfe7a2a6@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c9d5ff20929e8a3c8794facf4c4b326a9c10618812eec356caa20b87@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f60afd3c7e9ebaaf70fad4a4beb75cf8740ac959017a31e7006c7486@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6ae1cd4b5fea7aed9830dc6f6d58228fed7@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf7f87810c38dc9abf9f93989f76008f504cbf7c1a355214640b2d04c@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20171214-0002/'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2017/dsa-4004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99623'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039744'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039947'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040360'}] | {'cwe_ids': ['CWE-184', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:14Z', 'nvd_published_at': '2018-02-06T15:29:00Z'} |
1.4.0 | GHSA-8p5p-ff7x-hw7q | 2021-09-07T20:23:14Z | 2018-10-10T17:27:58Z | null | ['CVE-2018-3747'] | Cross-Site Scripting in public | Versions of `public` prior to 0.1.4 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
Upgrade to version 0.1.4 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'public'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3747'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/316346'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/329950'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8p5p-ff7x-hw7q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1000'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4cj8-g9cp-v5wr | 2022-09-14T19:19:04Z | 2018-10-22T18:53:56Z | null | ['CVE-2018-9206'] | Unrestricted Upload of File with Dangerous Type in blueimp-file-upload | Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'blueimp-file-upload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.22.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-9206'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4cj8-g9cp-v5wr'}, {'type': 'WEB', 'url': 'https://wpvulndb.com/vulnerabilities/9136'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45790/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/46182/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105679'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106629'}, {'type': 'WEB', 'url': 'http://www.vapidlabs.com/advisory.php?v=204'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hr2v-3952-633q | 2021-09-14T17:26:45Z | 2018-10-09T00:44:59Z | null | ['CVE-2018-3750'] | Prototype Pollution in deep-extend | Versions of `deep-extend` before 0.5.1 are vulnerable to prototype pollution.
## Recommendation
Update to version 0.5.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'deep-extend'}, 'ecosystem_specific': {'affected_functions': ['deep-extend']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3750'}, {'type': 'WEB', 'url': 'https://github.com/unclechu/node-deep-extend/commit/9423fae877e2ab6b4aecc4db79a0ed63039d4703'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/311333'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hr2v-3952-633q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/612'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-84cm-x2q5-8225 | 2023-09-27T12:57:00Z | 2018-10-15T22:03:48Z | null | ['CVE-2018-15494'] | dojox vulnerable to unescaped string injection | In Dojo Toolkit before 1.14.0, there is unescaped string injection in dojox/Grid/DataGrid. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15494'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojox/pull/283'}, {'type': 'WEB', 'url': 'https://dojotoolkit.org/blog/dojo-1-14-released'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-84cm-x2q5-8225'}, {'type': 'PACKAGE', 'url': 'https://github.com/dojo/dojox'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/09/msg00002.html'}] | {'cwe_ids': ['CWE-116'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xv7x-x6wr-xx7g | 2021-09-22T16:46:50Z | 2018-10-17T17:22:05Z | null | ['CVE-2016-8746'] | Moderate severity vulnerability that affects org.apache.ranger:ranger | Apache Ranger before 0.6.3 policy engine incorrectly matches paths in certain conditions when policy does not contain wildcards and has recursion flag set to true. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8746'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xv7x-x6wr-xx7g'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95998'}] | {'cwe_ids': ['CWE-426'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r97x-3g8f-gx3m | 2022-04-27T13:27:33Z | 2018-10-17T16:23:50Z | null | ['CVE-2016-1000340'] | The Bouncy Castle JCE Provider carry a propagation bug | In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so there was the possibility of rare (in general usage) spurious calculations for elliptic curve scalar multiplications. Such errors would have been detected with high probability by the output validation for our scalar multipliers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.51'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.51'}, {'fixed': '1.56'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000340'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r97x-3g8f-gx3m'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qhqf-ghgh-x2m4 | 2021-10-08T21:18:12Z | 2018-10-16T19:57:38Z | null | ['CVE-2017-0249'] | High severity vulnerability that affects Microsoft.AspNetCore.Mvc | See https://nvd.nist.gov/vuln/detail/CVE-2017-0249 & https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0249 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.1'}, {'fixed': '4.1.2'}]}], 'versions': ['4.1.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.1'}, {'fixed': '4.3.2'}]}], 'versions': ['4.3.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'DisCatSharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.8.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0249'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/239'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qhqf-ghgh-x2m4'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:02Z', 'nvd_published_at': '2017-05-12T14:29:00Z'} |
1.4.0 | GHSA-whw7-h25v-9qvx | 2020-06-16T22:00:38Z | 2018-10-18T16:56:38Z | null | ['CVE-2017-7661'] | Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fediz:fediz-jetty9, and org.apache.cxf.fediz:fediz-spring2 | Apache CXF Fediz ships with a number of container-specific plugins to enable WS-Federation for applications. A CSRF (Cross Style Request Forgery) style vulnerability has been found in the Spring 2, Spring 3, Jetty 8 and Jetty 9 plugins in Apache CXF Fediz prior to 1.4.0, 1.3.2 and 1.2.4. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-jetty9'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-jetty8'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7661'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-whw7-h25v-9qvx'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2017-7661.txt.asc'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1038497'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:38Z', 'nvd_published_at': '2017-05-16T17:29:00Z'} |
1.4.0 | GHSA-6mx3-3vqg-hpp2 | 2023-09-05T18:37:43Z | 2018-10-03T20:07:39Z | null | ['CVE-2018-16984'] | Django allows unprivileged users to read the password hashes of arbitrary accounts | An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16984'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6mx3-3vqg-hpp2'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190502-0009/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200517123022/http://www.securitytracker.com/id/1041749'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2018/oct/01/security-release/'}] | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wgmx-52ph-qqcw | 2023-08-31T21:42:54Z | 2018-10-10T16:05:23Z | null | ['CVE-2018-10895'] | Qutebrowser CSRF Vulnerability | qutebrowser before version 1.4.1 is vulnerable to a cross-site request forgery flaw that allows websites to access `qute://*` URLs. A malicious website could exploit this to load a `qute://settings/set` URL, which then sets `editor.command` to a bash script, resulting in arbitrary code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'qutebrowser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10895'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/43e58ac865ff862c2008c510fc5f7627e10b4660'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wgmx-52ph-qqcw'}, {'type': 'PACKAGE', 'url': 'https://github.com/qutebrowser/qutebrowser'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-778x-2mqv-w6xw | 2020-06-16T21:21:49Z | 2018-10-18T16:48:01Z | null | ['CVE-2016-8629'] | Moderate severity vulnerability that affects org.keycloak:keycloak-core | Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8629'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0872'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0873'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1388988'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-778x-2mqv-w6xw'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0876.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97392'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1038180'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qcj7-g2j5-g7r3 | 2022-04-27T13:28:09Z | 2018-10-17T16:24:12Z | null | ['CVE-2016-1000342'] | In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification | In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000342'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qcj7-g2j5-g7r3'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3727-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m929-7fr6-cvjg | 2022-04-27T13:58:00Z | 2018-10-17T17:23:36Z | null | ['CVE-2018-1259'] | Spring Data Commons, used in combination with XMLBeam, contains a property binder vulnerability caused by improper restriction of XML external entity references | Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1259'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1809'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m929-7fr6-cvjg'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1259'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:35Z', 'nvd_published_at': '2018-05-11T20:29:00Z'} |
1.4.0 | GHSA-h6rp-8v4j-hwph | 2023-02-15T22:19:51Z | 2018-10-16T23:13:49Z | null | ['CVE-2014-0003'] | Apache Camel's XSLT component allows remote attackers to execute arbitrary Java methods | The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0'}, {'fixed': '2.12.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0003'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229061309/http://www.securityfocus.com/bid/65902'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0245.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0254.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0371.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0372.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:14Z', 'nvd_published_at': '2014-03-21T04:38:00Z'} |
1.4.0 | GHSA-g8j6-m4p7-5rfq | 2021-09-10T20:29:38Z | 2018-10-16T17:18:12Z | null | ['CVE-2017-0929'] | High severity vulnerability that affects DotNetNuke.Core | DNN (aka DotNetNuke) before 9.2.0 suffers from a Server-Side Request Forgery (SSRF) vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0929'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g8j6-m4p7-5rfq'}, {'type': 'PACKAGE', 'url': 'https://github.com/dnnsoftware/Dnn.Platform'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qvxv-pmq9-4q7g | 2021-09-16T21:08:26Z | 2018-10-19T16:51:11Z | null | ['CVE-2017-15288'] | High severity vulnerability that affects org.scala-lang:scala-compiler | The compilation daemon in Scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${USER:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.scala-lang:scala-compiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.scala-lang:scala-compiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.scala-lang:scala-compiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0'}, {'fixed': '2.12.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15288'}, {'type': 'WEB', 'url': 'https://github.com/scala/scala/pull/6108'}, {'type': 'WEB', 'url': 'https://github.com/scala/scala/pull/6120'}, {'type': 'WEB', 'url': 'https://github.com/scala/scala/pull/6128'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qvxv-pmq9-4q7g'}, {'type': 'PACKAGE', 'url': 'https://github.com/scala/scala'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r10dd8e5b3bbe3bb531aa4a65472ce56f91efbb77ea9fe04bb8272e2c@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r18a05115cfa078c0f4e5c1ea2e8d64804f63e0095aa2174a3afecc0f@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d51eae81ceb7bfd1780936a48b460ab31d53ff2ed526a88a7f60fe4@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r32e0b1d5ff43ac3ed4b179a4e663022d1c5ccac77884a99ea149e633@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33665e9213cc6df1e48c3d99d1b0c7a3203e9bd0ef4fc4ba838bcb04@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f10022ec972c8df29a950d1a591c16562eeddd9194d3010e46b9b76@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5a1418a4f5101f5af3fc14bf358c54f2c7200e6a3701de2e2f581e1b@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r628ea3ea2fed4d9c1c5232a0b1ed108a15abc9fd2f0aaca1e8cc9164@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re72f4d04dfc398aae0e38dbfeccf44780df2782623a610cbfcec6f3a@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf57e4d7211b30e51803911304f3b7b54393f7a4bd60bb0784c31eec1@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201812-08'}, {'type': 'WEB', 'url': 'http://scala-lang.org/news/security-update-nov17.html'}] | {'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:54Z', 'nvd_published_at': '2017-11-15T16:29:00Z'} |
1.4.0 | GHSA-xpwp-rq3x-x6v7 | 2020-06-16T22:03:58Z | 2018-10-16T17:35:04Z | null | ['CVE-2017-0907'] | Critical severity vulnerability that affects recurly-api-client | The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeUriString" that could result in compromise of API keys or other critical resources. | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.10'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.8'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.14'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.1'}]}], 'versions': ['1.7.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.1'}]}], 'versions': ['1.8.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0907'}, {'type': 'WEB', 'url': 'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288635'}, {'type': 'WEB', 'url': 'https://dev.recurly.com/page/net-updates'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xpwp-rq3x-x6v7'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cx8m-8xmx-q8v3 | 2023-09-12T18:51:51Z | 2018-10-10T17:25:12Z | null | ['CVE-2018-3767'] | Denial of Service in memjs | Versions of `memjs` prior to 1.2.2 are vulnerable to Denial of Service (DoS). The package fails to sanitize the `value` option passed to the Buffer constructor, which may allow attackers to pass large values exhausting system resources.
## Recommendation
Upgrade to version 1.2.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'memjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3767'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319809'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cx8m-8xmx-q8v3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/970'}] | {'cwe_ids': ['CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4r7g-7cpj-5jr7 | 2023-08-28T10:50:19Z | 2018-10-19T16:41:15Z | null | ['CVE-2017-15701'] | Apache Qpid Broker-J vulnerable to Denial of Service (DoS) via uncontrolled resource consumption | In Apache Qpid Broker-J versions 6.1.0 through 6.1.4 (inclusive) the broker does not properly enforce a maximum frame size in AMQP 1.0 frames. A remote unauthenticated attacker could exploit this to cause the broker to exhaust all available memory and eventually terminate. Older AMQP protocols are not affected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-broker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15701'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4r7g-7cpj-5jr7'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/qpid-broker-j'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/QPID-7947'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4054e1c90993f337eeea24a312841c0661653e673c0ff8e2cd9520fe@%3Cdev.qpid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://qpid.apache.org/cves/CVE-2017-15701.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102041'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w6gv-3r3v-gwgj | 2023-09-07T20:31:12Z | 2018-10-18T16:47:41Z | null | ['CVE-2017-2585'] | keycloak-core vulnerable to timing attacks against JWS token verification | Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2585'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0872'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0873'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1412376'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w6gv-3r3v-gwgj'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170420113802/http://www.securitytracker.com/id/1038180'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227175650/http://www.securityfocus.com/bid/97393'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0876.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rf7q-xqm3-6923 | 2022-04-27T13:48:55Z | 2018-10-17T17:21:37Z | null | ['CVE-2016-5395'] | Apache Ranger allows remote authenticated administrators to inject arbitrary web script or HTML | Cross-site scripting (XSS) vulnerability in the create user functionality in the policy admin tool in Apache Ranger before 0.6.1 allows remote authenticated administrators to inject arbitrary web script or HTML via vectors related to policies. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5395'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rf7q-xqm3-6923'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/92577'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9prh-257w-9277 | 2021-09-08T20:16:46Z | 2018-10-23T17:20:12Z | null | ['CVE-2015-8861'] | Cross-Site Scripting in handlebars | Versions of `handlebars` prior to 4.0.0 are affected by a cross-site scripting vulnerability when attributes in handlebar templates are not quoted.
## Proof of Concept
Template:
```<a href={{foo}}/>```
Input:
```{ 'foo' : 'test.com onload=alert(1)'}```
Rendered result:
```<a href=test.com onload=alert(1)/>```
## Recommendation
Update to version 4.0.0 or later.
Alternatively, ensure that all attributes in handlebars templates are encapsulated with quotes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8861'}, {'type': 'WEB', 'url': 'https://github.com/wycats/handlebars.js/pull/1083'}, {'type': 'WEB', 'url': 'https://blog.srcclr.com/handlebars_vulnerability_research_findings/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9prh-257w-9277'}, {'type': 'PACKAGE', 'url': 'https://github.com/wycats/handlebars.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/61'}, {'type': 'WEB', 'url': 'https://www.sourceclear.com/blog/handlebars_vulnerability_research_findings/'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2016-18'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96434'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ffjh-fjgg-mfpq | 2021-09-10T18:07:43Z | 2018-10-17T17:22:49Z | null | ['CVE-2017-7677'] | Moderate severity vulnerability that affects org.apache.ranger:ranger | In environments that use external location for hive tables, Hive Authorizer in Apache Ranger before 0.7.1 should be checking RWX permission for create table. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7677'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ffjh-fjgg-mfpq'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98961'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-93jq-624g-4p9p | 2022-09-14T19:16:10Z | 2018-10-19T16:50:50Z | null | ['CVE-2017-14063'] | Improper Input Validation in async-http-client | Async Http Client (aka async-http-client) before 2.0.35 can be tricked into connecting to a host different from the one extracted by java.net.URI if a '?' character occurs in a fragment identifier. Similar bugs were previously identified in cURL (CVE-2016-8624) and Oracle Java 8 java.net.URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.asynchttpclient:async-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.35'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14063'}, {'type': 'WEB', 'url': 'https://github.com/AsyncHttpClient/async-http-client/issues/1455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'PACKAGE', 'url': 'https://github.com/AsyncHttpClient/async-http-client'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-93jq-624g-4p9p'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04b15fd898a6b1612153543375daaa8145a0fd1804ec9fa2e0d95c97@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a6b6429a7558051dbb70bd06584b4b1c334a80ec9203d3d39b7045a@%3Ccommits.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r14a74d204f285dd3a4fa203de6dbb4e741ddb7fdfff7915590e5b3db@%3Cdev.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3df4b7ccc363b4850a24842138117aa4451b875bc4773a845b828fc6@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r41a0e2c36f7d1854a4d56cb1e4aa720ef501782d887ece1c9b1e2d60@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ebb9596d890f3528630492bd78237b3eef06f093bac238a0da9b630@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b8666c4414500ff6e993bfa69cb6afa19b1b67c4585a045c0c21662@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f07c30721503d4c02d5451f77a611a1a0bb2a94ddcdf071c9485ea3@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f794dc07913c5f2ec08f540813b40e61b562d36f8b1f916e8705c56@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r683d78c6d7a15659f2bb82dd4120dab8c45a870eaa7f1a15cce4ed3b@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7046a51116207588e36ca8c2e291327e391dae40712d267117475a98@%3Cdev.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7879a48644f708be0529bd39f0679ad3ad951f3dc24442878a008fd8@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79d9bab405414af45568c4683386f5e9fd02c10ca87ffa2ee33512dc@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r868875e67494a18d31e88cba2672f45c3fc6708ffdde445723004da4@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ea5d489e004b40baf73880c4e11dd4de24b799d15e091e1f4017108@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbbad61e1ba5b21e234a6664963618acfee237af754eb20300d938e1e@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc4fbb06ccb10e26e6064f57f6bd4935eabe2d18a0cb9a7183699396@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc550b8955b37b40fee18db99f167337c41c930d8c3763b9631e01dda@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb46acc25917e01ebecca132e870da9ab935d5796686ed8a2785b026@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re2510852c4a1f635b14b35e5dfd7597076928e723ab08559ede575e0@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re7367895ccbf64523efcd39a9181baf2eaa30b069d8d6496852fba56@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd823a733b02cffbef5a69953fdcbed2d1d0afad5e1ea4e96ff6bf0a@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe55d83e4070bcc9285bbbf6bc39635dbcbba6d14d89aab0f339c83a@%3Ccommits.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2017/08/31/4'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-crvj-3gj9-gm2p | 2020-06-16T21:43:40Z | 2018-10-09T00:44:29Z | 2020-06-16T21:32:53Z | [] | High severity vulnerability that affects qs | Withdrawn, accidental duplicate publish.
The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array. | [] | [{'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7191'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-crvj-3gj9-gm2p'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-37q6-576q-vgr7 | 2021-08-31T20:51:48Z | 2018-10-30T20:36:53Z | null | ['CVE-2018-14731'] | Missing Origin Validation in parcel-bundler | Versions of `parcel-bundler` before 1.10.0 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated.
## Recommendation
Update to version 1.10.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parcel-bundler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14731'}, {'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/issues/1783'}, {'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/pull/1794'}, {'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4'}, {'type': 'WEB', 'url': 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages'}, {'type': 'WEB', 'url': 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-37q6-576q-vgr7'}, {'type': 'PACKAGE', 'url': 'https://github.com/parcel-bundler/parcel'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/721'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rvgg-f8qm-6h7j | 2020-06-16T21:55:57Z | 2018-10-17T16:19:43Z | null | ['CVE-2018-12540'] | High severity vulnerability that affects io.vertx:vertx-web | In version from 3.0.0 to 3.5.2 of Eclipse Vert.x, the CSRFHandler do not assert that the XSRF Cookie matches the returned XSRF header/form parameter. This allows replay attacks with previously issued tokens which are not expired yet. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12540'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2371'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536948'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rvgg-f8qm-6h7j'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r10aef585c521f8ef603f5831f9d97a27d920624025131da950e0c62f@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3fffda8e947edaa359152c8dc4c4ea9c96fd8ced1999bbce92bc6b25@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r59482ebed302aa49ac7e0c51737499746b0d086fcdeb8f90e705951f@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc5b4ae8a7caae6d3d5b3266cb050823b96dd62b30718b90b778d3d8b@%3Ccommits.pulsar.apache.org%3E'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g556-x5vx-qh59 | 2022-09-14T19:15:38Z | 2018-10-19T16:50:33Z | null | ['CVE-2017-1000498'] | Android SVG vulnerable to XML External Entity (XXE) | AndroidSVG version 1.2.2 is vulnerable to XXE attacks in the SVG parsing component resulting in denial of service and possibly remote code execution | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.caverock:androidsvg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000498'}, {'type': 'WEB', 'url': 'https://github.com/BigBadaboom/androidsvg/issues/122'}, {'type': 'PACKAGE', 'url': 'https://github.com/BigBadaboom/androidsvg'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g556-x5vx-qh59'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wfcc-pff6-rgc5 | 2023-08-15T20:33:37Z | 2018-10-19T16:15:46Z | null | ['CVE-2017-9735'] | Jetty vulnerable to exposure of sensitive information due to observable discrepancy | Jetty through 9.4.x contains a timing channel attack in `util/security/Password.java`, which allows attackers to obtain access by observing elapsed times before rejection of incorrect passwords. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.6.v20170531'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.5.v20170502'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.20.v20170531'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.3.19.v20170502'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.22.v20170606'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.21.v20170120'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9735'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/issues/1556'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/commit/042f325f1cd6e7891d72c7e668f5947b5457dc02'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/864631'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/36870f6c51f5bc25e6f7bb1fcace0e57e81f1524019b11f466738559@%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f887a5978f5e4c62b9cfe876336628385cff429e796962649649ec8a@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170826163336/http://www.securityfocus.com/bid/99104'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}] | {'cwe_ids': ['CWE-200', 'CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:10Z', 'nvd_published_at': '2017-06-16T21:29:00Z'} |
1.4.0 | GHSA-qv32-7r6p-xhhh | 2021-09-16T21:06:35Z | 2018-10-19T16:39:29Z | null | ['CVE-2016-4216'] | Moderate severity vulnerability that affects com.adobe.xmp:xmpcore | XMPCore in Adobe XMP Toolkit for Java before 5.1.3 allows remote attackers to read arbitrary files via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.adobe.xmp:xmpcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4216'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qv32-7r6p-xhhh'}, {'type': 'WEB', 'url': 'https://helpx.adobe.com/security/products/xmpcore/apsb16-24.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/91717'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9qgc-p27w-3hjg | 2021-09-08T20:46:55Z | 2018-10-22T20:37:07Z | null | ['CVE-2018-16131'] | High severity vulnerability that affects com.typesafe.akka:akka-http-core_2.11 and com.typesafe.akka:akka-http-core_2.12 | The decodeRequest and decodeRequestWith directives in Lightbend Akka HTTP 10.1.x through 10.1.4 and 10.0.x through 10.0.13 allow remote attackers to cause a denial of service (memory consumption and daemon crash) via a ZIP bomb. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.akka:akka-http-core_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0'}, {'fixed': '10.1.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.akka:akka-http-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0'}, {'fixed': '10.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16131'}, {'type': 'WEB', 'url': 'https://github.com/akka/akka-http/issues/2137'}, {'type': 'WEB', 'url': 'https://akka.io/blog/news/2018/08/30/akka-http-dos-vulnerability-found'}, {'type': 'WEB', 'url': 'https://doc.akka.io/docs/akka-http/current/security/2018-09-05-denial-of-service-via-decodeRequest.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9qgc-p27w-3hjg'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/akka-security/Dj7INsYWdjg'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5mf7-26mw-3rqr | 2021-09-01T22:17:57Z | 2018-10-17T15:50:45Z | null | ['CVE-2018-1338'] | Moderate severity vulnerability that affects org.apache.tika:tika-core | A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's BPGParser in versions of Apache Tika before 1.18. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1338'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5mf7-26mw-3rqr'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4d20c5748fb9f836653bc78a1bad991ba8485d82a1e821f70b641932@%3Cdev.tika.apache.org%3E'}] | {'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6v52-mj5r-7j2m | 2021-09-02T18:25:29Z | 2018-10-17T16:33:02Z | null | ['CVE-2018-8037'] | Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core | If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.5'}, {'fixed': '8.5.32'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8037'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2867'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2868'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1529'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6v52-mj5r-7j2m'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2ee3af8a43cb019e7898c9330cc8e73306553a27f2e4735dfb522d39@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5d15316dfb4adf75d96d394745f8037533fa3bcc1ac8f619bf5c044c@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180817-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4281'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090623.GA92700%40minotaur.apache.org%3E'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201808.mbox/%3C0c616b4d-4e81-e7f8-b81d-1bb4c575aa33%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104894'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041376'}] | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f2j6-wrhh-v25m | 2023-08-07T17:20:38Z | 2018-10-10T16:10:10Z | null | ['CVE-2018-1000805'] | Paramiko Authentication Bypass vulnerability | Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000805'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/issues/1283'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2018:3497'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3347'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3406'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3505'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f2j6-wrhh-v25m'}, {'type': 'PACKAGE', 'url': 'https://github.com/paramiko/paramiko'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/wp-content/uploads/sites/4/usd20180023.txt'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3796-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3796-2/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3796-3/'}] | {'cwe_ids': ['CWE-732', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:26Z', 'nvd_published_at': '2018-10-08T15:29:00Z'} |
1.4.0 | GHSA-q7pf-qr96-2vq5 | 2022-09-14T19:14:55Z | 2018-10-19T16:46:41Z | null | ['CVE-2017-1000208'] | Deserialization of Untrusted Data in swagger-parser | A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.swagger:swagger-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.swagger:swagger-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000208'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q7pf-qr96-2vq5'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-parser'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-parser/releases/tag/v1.0.31'}, {'type': 'WEB', 'url': 'https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6pcc-3rfx-4gpm | 2022-04-26T18:43:56Z | 2018-10-16T17:01:25Z | null | ['CVE-2018-1000632'] | Dom4j contains a XML Injection vulnerability | dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.
Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.dom4j:dom4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.dom4j:dom4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}], 'versions': ['2.1.0']}, {'package': {'ecosystem': 'Maven', 'name': 'dom4j:dom4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000632'}, {'type': 'WEB', 'url': 'https://github.com/dom4j/dom4j/issues/48'}, {'type': 'WEB', 'url': 'https://github.com/dom4j/dom4j/commit/c2a99d7dee8ce7a4e5bef134bb781a6672bd8a0f'}, {'type': 'WEB', 'url': 'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0362'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0364'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0365'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0380'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1160'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1161'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1162'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3172'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6pcc-3rfx-4gpm'}, {'type': 'PACKAGE', 'url': 'https://github.com/dom4j/dom4j/'}, {'type': 'WEB', 'url': 'https://ihacktoprotect.com/post/dom4j-xml-injection/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/00571f362a7a2470fba50a31282c65637c40d2e21ebe6ee535a4ed74@%3Ccommits.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4a77652531d62299a30815cf5f233af183425db8e3c9a824a814e768@%3Cdev.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5a020ecaa3c701f408f612f7ba2ee37a021644c4a39da2079ed3ddbc@%3Ccommits.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7e9e78f0e4288fac6591992836d2a80d4df19161e54bd71ab4b8e458@%3Cdev.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7f6e120e6ed473f4e00dde4c398fc6698eb383bd7857d20513e989ce@%3Cdev.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9d4c1af6f702c3d6d6f229de57112ddccac8ce44446a01b7937ab9e0@%3Ccommits.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d7d960b2778e35ec9b4d40c8efd468c7ce7163bcf6489b633491c89f@%3Cdev.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/09/msg00028.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOOVVCRQE6ATFD2JM2EMDXOQXTRIVZGP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJULAHVR3I5SX7OSMXAG75IMNSAYOXGA/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}] | {'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:56Z', 'nvd_published_at': '2018-08-20T19:31:00Z'} |
1.4.0 | GHSA-p8jx-x2vw-wm33 | 2021-09-16T16:13:14Z | 2018-10-17T19:48:06Z | null | ['CVE-2018-1331'] | High severity vulnerability that affects org.apache.storm:storm-core | In Apache Storm 0.10.0 through 0.10.2, 1.0.0 through 1.0.6, 1.1.0 through 1.1.2, and 1.2.0 through 1.2.1, an attacker with access to a secure storm cluster in some cases could execute arbitrary code as a different user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1331'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p8jx-x2vw-wm33'}, {'type': 'WEB', 'url': 'http://storm.apache.org/2018/06/04/storm113-released.html'}, {'type': 'WEB', 'url': 'http://storm.apache.org/2018/06/04/storm122-released.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2018/07/10/4'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104732'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041273'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3357-829x-m9pr | 2022-09-13T23:37:01Z | 2018-10-18T16:57:00Z | null | ['CVE-2015-5175'] | Apache CXF Fediz application plugins are vulnerable to Denial of Service (DoS) attacks | Application plugins in Apache CXF Fediz prior to version 1.1.3 and 1.2.x prior to 1.2.1 allow remote attackers to create a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-idp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-idp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'fixed': '1.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5175'}, {'type': 'WEB', 'url': 'https://github.com/apache/cxf-fediz/commit/f65c961ea31e3c1851daba8e7e49fc37bbf77b19'}, {'type': 'WEB', 'url': 'https://cxf.apache.org/security-advisories.data/CVE-2015-5175.txt.asc?version=1&modificationDate=1440598018000&api=v2'}, {'type': 'WEB', 'url': 'https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git;a=commit;h=f65c961ea31e3c1851daba8e7e49fc37bbf77b19'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3357-829x-m9pr'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/cxf-dev/201508.mbox/%3CCAB8XdGAx=VL_uepDSecE2h8ggTD4kpagXnyfegVjt7Axi_Ossw@mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/08/26/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/76486'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:50Z', 'nvd_published_at': '2017-06-07T20:29:00Z'} |
1.4.0 | GHSA-vgg8-72f2-qm23 | 2021-06-10T20:19:49Z | 2018-10-19T16:15:34Z | null | ['CVE-2017-7657'] | Critical severity vulnerability that affects org.eclipse.jetty:jetty-server | In Eclipse Jetty, versions 9.2.x and older, 9.3.x, transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.25.v20180606'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.25.v20180105'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.24.v20180605'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.3.23.v20180228'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7657'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0910'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535668'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vgg8-72f2-qm23'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181014-0001/'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4278'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041194'}] | {'cwe_ids': ['CWE-190', 'CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:40Z', 'nvd_published_at': '2018-06-26T16:29:00Z'} |
1.4.0 | GHSA-fjqm-246c-mwqg | 2022-04-27T13:35:24Z | 2018-10-17T16:27:28Z | null | ['CVE-2016-1000346'] | In Bouncy Castle JCE Provider the other party DH public key is not fully validated | In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000346'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fjqm-246c-mwqg'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3727-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-76qr-mmh8-cp8f | 2021-09-02T19:24:32Z | 2018-10-19T16:56:00Z | null | ['CVE-2018-9159'] | Moderate severity vulnerability that affects com.sparkjava:spark-core | In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.sparkjava:spark-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-9159'}, {'type': 'WEB', 'url': 'https://github.com/perwendel/spark/issues/981'}, {'type': 'WEB', 'url': 'https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668'}, {'type': 'WEB', 'url': 'https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd'}, {'type': 'WEB', 'url': 'https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2020'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2405'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-76qr-mmh8-cp8f'}, {'type': 'PACKAGE', 'url': 'https://github.com/perwendel/spark'}, {'type': 'WEB', 'url': 'http://sparkjava.com/news#spark-272-released'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mv2r-q4g5-j8q5 | 2022-07-07T21:37:06Z | 2018-10-16T19:58:31Z | null | ['CVE-2018-8269'] | Denial of service in ASP.NET Core | A denial of service vulnerability exists when OData Library improperly handles web requests, aka "OData Denial of Service Vulnerability." This affects Microsoft.Data.OData. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Data.OData'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.DataProtection.AzureStorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.DataProtection.AzureStorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.7'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8269'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/385'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mv2r-q4g5-j8q5'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8269'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/46101/'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rpch-cqj9-h65r | 2021-09-17T19:23:01Z | 2018-10-16T17:01:10Z | null | ['CVE-2018-1000210'] | High severity vulnerability that affects YamlDotNet and YamlDotNet.Signed | YamlDotNet version 4.3.2 and earlier contains a Insecure Direct Object Reference vulnerability in The default behavior of Deserializer.Deserialize() will deserialize user-controlled types in the line "currentType = Type.GetType(nodeEvent.Tag.Substring(1), throwOnError: false);" and blindly instantiates them. that can result in Code execution in the context of the running process. This attack appear to be exploitable via Victim must parse a specially-crafted YAML file. This vulnerability appears to have been fixed in 5.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'YamlDotNet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'YamlDotNet.Signed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000210'}, {'type': 'WEB', 'url': 'https://github.com/aaubry/YamlDotNet#version-500'}, {'type': 'WEB', 'url': 'https://github.com/aaubry/YamlDotNet/blob/f96b7cc40a0498f8bafdeb49df3aa23aa2c60993/YamlDotNet/Serialization/NodeTypeResolvers/TypeNameInTagNodeTypeResolver.cs#L35'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rpch-cqj9-h65r'}, {'type': 'PACKAGE', 'url': 'ps://github.com/aaubry/YamlDotNet'}] | {'cwe_ids': ['CWE-502', 'CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ccjp-w723-2jf2 | 2023-09-12T15:51:03Z | 2018-10-17T15:44:10Z | null | ['CVE-2015-3271'] | Apache Tika Server exposes sensitive information | Apache Tika provides optional functionality to run itself as a web service to allow remote use. When used in this manner,
it's possible for a 3rd party to pass a 'fileUrl' header to the Apache Tika Server (tika-server) before version 1.10. This header lets a remote client request that the server fetches content from the URL provided, including files from the server's local filesystem. Depending on the file permissions set on the local filesystem, this could be used to return sensitive content from the server machine.
This vulnerability only exists if you are running the tika-server version 1.9, and you allow un-trusted access to the tika-server
URL. Usage of Apache Tika as a standard library is not affected.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3271'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ccjp-w723-2jf2'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tika'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d2b3e7afb0251fac95fdee9817423cbc91e3d99a848c25a51d91c1e8%401439485507%40%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d2b3e7afb0251fac95fdee9817423cbc91e3d99a848c25a51d91c1e8@1439485507@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/08/13/5'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95020'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:02Z', 'nvd_published_at': '2016-12-15T22:59:00Z'} |
1.4.0 | GHSA-qw96-mm2g-c8m7 | 2022-04-26T18:43:28Z | 2018-10-15T21:43:12Z | null | ['CVE-2018-18282'] | Next.js has cross site scripting (XSS) vulnerability via the 404 or 500 /_error page | Next.js 7.0.0 and 7.0.1 has XSS via the 404 or 500 /_error page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18282'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qw96-mm2g-c8m7'}, {'type': 'PACKAGE', 'url': 'https://github.com/zeit/next.js'}, {'type': 'WEB', 'url': 'https://github.com/zeit/next.js/releases/tag/7.0.2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g8hw-794c-4j9g | 2022-06-24T19:56:11Z | 2018-10-17T20:07:03Z | null | ['CVE-2018-1271'] | Path Traversal in org.springframework:spring-core | Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1271'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2939'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g8hw-794c-4j9g'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1271'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103699'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:29Z', 'nvd_published_at': '2018-04-06T13:29:00Z'} |
1.4.0 | GHSA-4xr4-4c65-hj7f | 2022-04-26T21:46:36Z | 2018-10-17T15:44:22Z | null | ['CVE-2016-4434'] | Apache Tika does not properly initialize the XML parser or choose handlers | Apache Tika before 1.13 does not properly initialize the XML parser or choose handlers, which might allow remote attackers to conduct XML External Entity (XXE) attacks via vectors involving (1) spreadsheets in OOXML files and (2) XMP metadata in PDF and other file formats, a related issue to CVE-2016-2175. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4434'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4xr4-4c65-hj7f'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/tika-dev/201605.mbox/%3C1705136517.1175366.1464278135251.JavaMail.yahoo%40mail.yahoo.com%3E'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0248.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0249.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0272.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/538500/100/0/threaded'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cr6j-3jp9-rw65 | 2022-10-04T21:52:32Z | 2018-10-18T19:24:38Z | null | ['CVE-2018-11776'] | Apache Struts vulnerable to remote command execution (RCE) due to improper input validation | Apache Struts contains a Remote Code Execution when using results with no namespace and it's upper actions have no or wildcard namespace. The same flaw exists when using a url tag with no value, action set, and it's upper actions have no or wildcard namespace. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.4'}, {'fixed': '2.3.35'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.34'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5'}, {'fixed': '2.5.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.16'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11776'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-057'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cr6j-3jp9-rw65'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'https://github.com/hook-s3c/CVE-2018-11776-Python-PoC'}, {'type': 'WEB', 'url': 'https://lgtm.com/blog/apache_struts_CVE-2018-11776'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180822-0001/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181018-0002/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45260/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45262/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45367/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105125'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041547'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041888'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4rjf-mxfm-98h5 | 2022-04-27T13:48:01Z | 2018-10-17T17:21:29Z | null | ['CVE-2016-2174'] | SQL injection vulnerability in the policy admin tool in Apache Ranger | SQL injection vulnerability in the policy admin tool in Apache Ranger before 0.5.3 allows remote authenticated administrators to execute arbitrary SQL commands via the eventTime parameter to service/plugins/policies/eventTime. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2174'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4rjf-mxfm-98h5'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/06/01/3'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mhx2-r3jx-g94c | 2022-11-17T19:39:36Z | 2018-10-16T23:09:15Z | null | ['CVE-2015-0264'] | Apache Camel allows remote actor to read arbitrary files via external entity in invalid XML string or GenericFile object | Multiple XML external entity (XXE) vulnerabilities in builder/xml/XPathBuilder.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allow remote attackers to read arbitrary files via an external entity in an invalid XML (1) String or (2) GenericFile object in an XPath query. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.14.0'}, {'fixed': '2.14.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0264'}, {'type': 'WEB', 'url': 'https://camel.apache.org/security-advisories.data/CVE-2015-0264.txt.asc'}, {'type': 'WEB', 'url': 'https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=1df559649a96a1ca0368373387e542f46e4820da'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mhx2-r3jx-g94c'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1041.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1538.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1539.html'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id/1032442'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xm6r-4466-mr74 | 2022-09-13T23:39:11Z | 2018-10-18T17:40:56Z | null | ['CVE-2017-11467'] | OrientDB vulnerable to Improper Privilage Management leading to arbitrary command injection | OrientDB through 2.2.22 does not enforce privilege requirements during "where" or "fetchplan" or "order by" use, which allows remote attackers to execute arbitrary OS commands via a crafted request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11467'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xm6r-4466-mr74'}, {'type': 'PACKAGE', 'url': 'https://github.com/orientechnologies/orientdb'}, {'type': 'WEB', 'url': 'https://github.com/orientechnologies/orientdb/wiki/OrientDB-2.2-Release-Notes#2223---july-11-2017'}, {'type': 'WEB', 'url': 'http://www.heavensec.org/?p=1703'}] | {'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p699-3wgc-7h72 | 2023-02-28T22:57:51Z | 2018-10-17T15:43:59Z | null | ['CVE-2018-1339'] | org.apache.tika:tika-parsers has an Infinite Loop vulnerability | Versions of the package `org.apache.tika:tika-parsers` before version 1.18 are vulnerable to Denial of Service (DoS) via a carefully crafted (or fuzzed) file that can trigger an infinite loop via the ChmParser. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-parsers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1339'}, {'type': 'WEB', 'url': 'https://github.com/apache/tika/commit/1b6ca3685c196cfd89f5f95c19cc919ce10c5aff#diff-43f8cbe58aaab159ce88bd95fafc46dd'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tika'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4d2cb5c819401bb075e2a1130e0d14f0404a136541a6f91da0225828@%3Cdev.tika.apache.org%3E'}] | {'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-872g-2h8h-362q | 2022-09-14T01:07:09Z | 2018-10-19T16:16:16Z | null | ['CVE-2016-4800'] | Jetty contains an alias issue that could allow unauthenticated remote code execution due to specially crafted request | The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4800'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-872g-2h8h-362q'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190307-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00092.html'}, {'type': 'WEB', 'url': 'http://www.ocert.org/advisories/ocert-2016-001.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/90945'}, {'type': 'WEB', 'url': 'http://www.zerodayinitiative.com/advisories/ZDI-16-362'}] | {'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-894f-rw44-qrw5 | 2023-09-12T18:47:59Z | 2018-10-10T17:28:21Z | null | ['CVE-2017-16077'] | mongose is malware | The `mongose` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mongose'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16077'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-894f-rw44-qrw5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/516'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6j63-35hj-vmcg | 2023-08-25T21:32:56Z | 2018-10-30T20:34:06Z | null | ['CVE-2018-18476'] | mysql-bunuuid-rails vulnerable to SQL injection | mysql-binuuid-rails 1.1.0 and earlier allows SQL Injection because it removes default string escaping for affected database columns. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'mysql-binuuid-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18476'}, {'type': 'WEB', 'url': 'https://github.com/nedap/mysql-binuuid-rails/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/nedap/mysql-binuuid-rails/commit/9ae920951b46ff0163b16c55d744e89acb1036d4'}, {'type': 'WEB', 'url': 'https://gist.github.com/viraptor/881276ea61e8d56bac6e28454c79f1e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/nedap/mysql-binuuid-rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mysql-binuuid-rails/CVE-2018-18476.yml'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:25Z', 'nvd_published_at': None} |