schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
14
228
details
stringlengths
48
1.45k
severity
stringlengths
2
78
affected
stringlengths
79
6.96k
references
stringlengths
143
6.38k
database_specific
stringlengths
131
174
1.4.0
GHSA-7f42-p84j-f58p
2023-01-23T20:47:11Z
2018-03-21T11:56:32Z
null
['CVE-2018-3740']
Sanitize vulnerable to Improper Input Validation and Cross-site Scripting
When Sanitize <= 4.6.2 is used in combination with libxml2 >= 2.9.2, a specially crafted HTML fragment can cause libxml2 to generate improperly escaped output, allowing non-whitelisted attributes to be used on whitelisted elements. This can allow HTML and JavaScript injection, which could result in XSS if Sanitize's output is served to browsers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sanitize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3740'}, {'type': 'WEB', 'url': 'https://github.com/rgrove/sanitize/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e'}, {'type': 'WEB', 'url': 'https://github.com/rgrove/sanitize/commit/93feeb38e21864146bb29191792b971dbe1ec62e'}, {'type': 'WEB', 'url': 'https://about.gitlab.com/2018/06/25/security-release-gitlab-11-dot-0-dot-1-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com/rgrove/sanitize'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sanitize/CVE-2018-3740.yml'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4358'}]
{'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:33Z', 'nvd_published_at': '2018-03-30T19:29:00Z'}
1.4.0
GHSA-x7rv-cr6v-4vm4
2023-07-05T20:45:55Z
2018-03-21T11:57:11Z
null
['CVE-2018-8048']
Cross-site Scripting in loofah
Loofah allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments. Users are affected if running Loofah < 2.2.1, but only: * when running on MRI or RBX, * in combination with libxml2 >= 2.9.2. JRuby users are not affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8048'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/issues/144'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/pull/1746'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/commit/f739cf8eac5851f328b8044281d6653f74eff116'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x7rv-cr6v-4vm4'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2018-8048.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-8048.yml'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191122-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4171'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2018/03/19/5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:35Z', 'nvd_published_at': None}
1.4.0
GHSA-hwhh-2fwm-cfgw
2022-04-26T17:36:10Z
2018-03-13T20:44:48Z
null
['CVE-2018-1000088']
Doorkeeper is vulnerable to stored XSS and code execution
Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link. This vulnerability appears to have been fixed in 4.2.6, 4.3.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '4.2.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000088'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/issues/969'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/pull/970'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/pull/328/files'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/commit/7b1a8373ecd69768c896000c7971dbf48948c1b5'}, {'type': 'WEB', 'url': 'https://blog.justinbull.ca/cve-2018-1000088-stored-xss-in-doorkeeper/'}, {'type': 'PACKAGE', 'url': 'https://github.com/doorkeeper-gem/doorkeeper'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.3.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/doorkeeper/CVE-2018-1000088.yml'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:16Z', 'nvd_published_at': None}
1.4.0
GHSA-6wpv-cj6x-v3jw
2023-01-25T23:04:00Z
2018-03-13T16:15:57Z
null
['CVE-2015-1828']
http vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
The Ruby http gem before 0.7.3 does not verify hostnames in SSL connections, which might allow remote attackers to obtain sensitive information via a man-in-the-middle-attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1828'}, {'type': 'WEB', 'url': 'https://github.com/ruby/openssl/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/http/CVE-2015-1828.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/httprb/jkb4oxwZjkU'}, {'type': 'WEB', 'url': 'https://rubysec.com/advisories/http-CVE-2015-1828'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:24Z', 'nvd_published_at': None}
1.4.0
GHSA-7h42-5vj2-cq39
2023-09-13T22:19:39Z
2018-03-13T20:42:00Z
null
['CVE-2018-1000096']
tiny-json-http missing SSL certificate validation
brianleroux tiny-json-http version all versions since commit [9b8e74a232bba4701844e07bcba794173b0238a8](https://github.com/brianleroux/tiny-json-http/commit/9b8e74a232bba4701844e07bcba794173b0238a8) (Oct 29 2016) contains a Missing SSL certificate validation vulnerability in The libraries core functionality is affected. that can result in Exposes the user to man-in-the-middle attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'tiny-json-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.1'}, {'fixed': '7.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000096'}, {'type': 'WEB', 'url': 'https://github.com/brianleroux/tiny-json-http/pull/15'}, {'type': 'WEB', 'url': 'https://github.com/brianleroux/tiny-json-http/commit/3c1e36d8bef3ef5fd8e4447f816d5ffe2bfc3190'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7h42-5vj2-cq39'}, {'type': 'PACKAGE', 'url': 'https://github.com/brianleroux/tiny-json-http'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:50Z', 'nvd_published_at': None}
1.4.0
GHSA-fjqr-fx3f-g4rv
2022-04-26T14:35:22Z
2018-03-26T16:41:20Z
null
['CVE-2018-1000118']
Electron protocol handler browser vulnerable to Command Injection
Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electron 1.8.2-beta.5. This issue is due to an incomplete fix for CVE-2018-1000006, specifically the black list used was not case insensitive allowing an attacker to potentially bypass it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2-beta5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2-beta4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000118'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7'}, {'type': 'WEB', 'url': 'https://electronjs.org/releases#1.8.2-beta.5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fjqr-fx3f-g4rv'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:50Z', 'nvd_published_at': None}
1.4.0
GHSA-w7q9-xr2x-wh7x
2023-08-29T11:24:57Z
2018-03-05T19:06:00Z
null
['CVE-2017-12097']
delayed_job_web Cross-site Scripting vulnerability
An exploitable cross site scripting (XSS) vulnerability exists in the filter functionality of the delayed_job_web rails gem versions 1.2.9 before 1.4.2. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'delayed_job_web'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.9'}, {'fixed': '1.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12097'}, {'type': 'WEB', 'url': 'https://github.com/ejschmitt/delayed_job_web/commit/6bcb10e61ea2b9a44ffa16be8536dff46ad51449'}, {'type': 'PACKAGE', 'url': 'https://github.com/ejschmitt/delayed_job_web'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/delayed_job_web/CVE-2017-12097.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/delayed_job_web/versions/1.4'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227132840/http://www.securityfocus.com/bid/102484'}, {'type': 'WEB', 'url': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0449'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:58Z', 'nvd_published_at': '2018-01-19T20:29:00Z'}
1.4.0
GHSA-pxr8-w3jq-rcwj
2023-07-03T21:59:02Z
2018-03-05T19:37:23Z
null
['CVE-2017-12098']
rails_admin ruby gem XSS
An exploitable cross site scripting (XSS) vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails_admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12098'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pxr8-w3jq-rcwj'}, {'type': 'PACKAGE', 'url': 'https://github.com/railsadminteam/rails_admin/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2017-12098.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210116160904/http://www.securityfocus.com/bid/102486'}, {'type': 'WEB', 'url': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0450'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:19Z', 'nvd_published_at': '2018-01-19T19:29:00Z'}
1.4.0
GHSA-446m-mv8f-q348
2021-08-31T21:44:15Z
2018-03-05T18:35:09Z
null
['CVE-2017-18214']
Regular Expression Denial of Service in moment
Affected versions of `moment` are vulnerable to a low severity regular expression denial of service when parsing dates as strings. ## Recommendation Update to version 2.19.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.19.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18214'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/issues/4163'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/pull/4326'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/commit/69ed9d44957fa6ab12b73d2ae29d286a857b80eb'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-446m-mv8f-q348'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/moment'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/532'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2019-02'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:13Z', 'nvd_published_at': '2018-03-04T21:29:00Z'}
1.4.0
GHSA-pcm6-g2qp-9gw8
2023-07-03T23:45:19Z
2018-03-16T01:13:46Z
null
['CVE-2014-4992']
Cap-Strap gem for Ruby places credentials on the useradd command line
lib/cap-strap/helpers.rb in the cap-strap gem 0.1.5 for Ruby places credentials on the useradd command line, which allows local users to obtain sensitive information by listing the process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'cap-strap'}, 'versions': ['0.1.5']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4992'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pcm6-g2qp-9gw8'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cap-strap/CVE-2014-4992.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/substantial/cap-strap'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/07/9'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/cap-strap-0.1.5.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:53Z', 'nvd_published_at': None}
1.4.0
GHSA-rrvx-pwf8-p59p
2022-04-27T13:29:11Z
2018-10-17T16:24:22Z
null
['CVE-2016-1000343']
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000343'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rrvx-pwf8-p59p'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3727-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:50Z', 'nvd_published_at': None}
1.4.0
GHSA-q35p-chc6-7x57
2021-09-16T19:20:04Z
2018-10-17T19:48:18Z
null
['CVE-2018-1332']
Moderate severity vulnerability that affects org.apache.storm:storm-core
Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose a vulnerability that could allow a user to impersonate another user when communicating with some Storm Daemons.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1332'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q35p-chc6-7x57'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/50f1d6a7af27f49d2e498a9ab2975685302cd8ca47000b7c38f339a4@%3Cdev.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104399'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:40Z', 'nvd_published_at': None}
1.4.0
GHSA-8fx9-5hx8-crhm
2022-04-26T18:59:36Z
2018-10-16T19:35:40Z
null
['CVE-2017-12611']
Apache Struts 2.0.1 uses an unintentional expression in a Freemarker tag instead of string literal
In Apache Struts 2.0.1 through 2.3.33 and 2.5 through 2.5.10, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.1'}, {'fixed': '2.3.34'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.33'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.10'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12611'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8fx9-5hx8-crhm'}, {'type': 'WEB', 'url': 'https://kb.netapp.com/support/s/article/ka51A000000CgttQAC/NTAP-20170911-0001'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-053.html'}, {'type': 'WEB', 'url': 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/100829'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:30Z', 'nvd_published_at': None}
1.4.0
GHSA-3m2r-q8x3-xmf7
2021-12-03T14:27:36Z
2018-10-16T19:59:48Z
null
[]
Moderate severity vulnerability that affects Microsoft.AspNetCore.All, Microsoft.AspNetCore.Server.Kestrel.Core, Microsoft.AspNetCore.Server.Kestrel.Transport.Abstractions, and Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv
Microsoft made an internal discovery of a security vulnerability in version 2.x of ASP.NET Core where a specially crafted request can cause excess resource consumption in Kestrel.
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Transport.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/300'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3m2r-q8x3-xmf7'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:28Z', 'nvd_published_at': None}
1.4.0
GHSA-4fq3-mr56-cg6r
2022-08-11T21:46:08Z
2018-10-17T17:23:24Z
null
['CVE-2018-1273']
Spring Data Commons remote code injection vulnerability
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding that can lead to a remote code execution attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1273'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4fq3-mr56-cg6r'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-data-commons'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1273'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/ignite-dev/201807.mbox/%3CCAK0qHnqzfzmCDFFi6c5Jok19zNkVCz5Xb4sU%3D0f2J_1i4p46zQ%40mail.gmail.com%3E'}]
{'cwe_ids': ['CWE-20', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:14Z', 'nvd_published_at': '2018-04-11T13:29:00Z'}
1.4.0
GHSA-q66c-h853-gqw2
2023-01-18T06:20:33Z
2018-10-16T19:49:48Z
null
['CVE-2016-4432']
AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication
The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-broker-plugins-amqp-0-8-protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-broker-plugins-amqp-1-0-protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4432'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/qpid-broker-j'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/QPID-7257'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1743161'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1743393'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:10Z', 'nvd_published_at': '2016-06-01T20:59:00Z'}
1.4.0
GHSA-p8xr-4v2c-rvgp
2021-06-10T22:05:21Z
2018-10-18T18:04:50Z
null
['CVE-2015-1836']
High severity vulnerability that affects org.apache.hbase:hbase
Apache HBase 0.98 before 0.98.12.1, 1.0 before 1.0.1.1, and 1.1 before 1.1.0.1, as used in IBM InfoSphere BigInsights 3.0, 3.0.0.1, and 3.0.0.2 and other products, uses incorrect ACLs for ZooKeeper coordination state, which allows remote attackers to cause a denial of service (daemon outage), obtain sensitive information, or modify data via unspecified client traffic.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hbase:hbase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.98'}, {'fixed': '0.98.12.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.98.12.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hbase:hbase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.1.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hbase:hbase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.0.1'}]}], 'versions': ['1.1.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1836'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p8xr-4v2c-rvgp'}, {'type': 'WEB', 'url': 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/www-announce/201505.mbox/%3CCA+RK=_CFiTfQ2d0V+kuJx_y5izmYccaKjXaJ3V72KK7tbOhbkg@mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21969546'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1034365'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:39Z', 'nvd_published_at': None}
1.4.0
GHSA-mwcx-532g-8pq3
2022-04-26T18:56:02Z
2018-10-16T17:44:11Z
null
['CVE-2018-12538']
Access and integrity issue within Eclipse Jetty
In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage for the FileSessionDataStore.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.11.v20180605'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.10.v20180503'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12538'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536018'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mwcx-532g-8pq3'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181014-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041194'}]
{'cwe_ids': ['CWE-384', 'CWE-6'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:31Z', 'nvd_published_at': None}
1.4.0
GHSA-2rcm-phc9-3945
2023-08-30T21:59:10Z
2018-10-10T16:10:23Z
null
['CVE-2018-1000808']
Pyopenssl Incorrect Memory Management
It was discovered that pyOpenSSL incorrectly handled memory when performing operations on a PKCS #12 store. A remote attacker could possibly use this issue to cause pyOpenSSL to consume resources, resulting in a denial of service. This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection that would cause the calling application to reload certificates from a PKCS #12 store. This vulnerability appears to have been fixed in 17.5.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyopenssl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000808'}, {'type': 'WEB', 'url': 'https://github.com/pyca/pyopenssl/pull/723'}, {'type': 'WEB', 'url': 'https://github.com/pyca/pyopenssl/commit/e73818600065821d588af475b024f4eb518c3509'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0085'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2rcm-phc9-3945'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/pyopenssl'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3813-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html'}]
{'cwe_ids': ['CWE-401', 'CWE-404'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:58Z', 'nvd_published_at': '2018-10-08T15:29:00Z'}
1.4.0
GHSA-7q9c-h23x-65fq
2022-09-14T01:01:53Z
2018-10-18T18:06:22Z
null
['CVE-2016-4977']
Spring Security OAuth vulnerable to remote code execution (RCE) via specially crafted request using whitelabel views
When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4977'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7q9c-h23x-65fq'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0841d849c23418c473ccb9183cbf41a317cb0476e44be48022ce3488@%3Cdev.fineract.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37d7e820fc65a768de3e096e98382d5529a52a039f093e59357d0bc0@%3Cdev.fineract.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5e6dd946635bbcc9e1f2591599ad0fab54f2dc3714196af3b17893f2@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/96c017115069408cec5e82ce1e6293facab398011f6db7e1befbe274@%3Cdev.fineract.apache.org%3E'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2016-4977'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/10/16/1'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:16Z', 'nvd_published_at': None}
1.4.0
GHSA-568q-9fw5-28wf
2020-06-16T21:00:08Z
2018-10-19T16:53:33Z
null
['CVE-2018-10936']
Moderate severity vulnerability that affects org.postgresql:pgjdbc-aggregate
A weakness was found in postgresql-jdbc before version 42.2.5. It was possible to provide an SSL Factory and not check the host name if a host name verifier was not provided to the driver. This could lead to a condition where a man-in-the-middle attacker could masquerade as a trusted server by providing a certificate for the wrong host, as long as it was signed by a trusted CA.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:pgjdbc-aggregate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '42.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10936'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10936'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-568q-9fw5-28wf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.postgresql.org/about/news/1883/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105220'}]
{'cwe_ids': ['CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:08Z', 'nvd_published_at': None}
1.4.0
GHSA-jj9h-mwhq-8vhm
2023-05-22T21:30:04Z
2018-10-16T19:50:13Z
null
['CVE-2016-3094']
Improper Input Validation in org.apache.qpid:qpid-broker
PlainSaslServer.java in Apache Qpid Java before 6.0.3, when the broker is configured to allow plaintext passwords, allows remote attackers to cause a denial of service (broker termination) via a crafted authentication attempt, which triggers an uncaught exception.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3094'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jj9h-mwhq-8vhm'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/QPID-7271'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1744403'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3C5748641A.2050701%40gmail.com%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/137215/Apache-Qpid-Java-Broker-6.0.2-Denial-Of-Service.html'}, {'type': 'WEB', 'url': 'http://qpid.apache.org/releases/qpid-java-6.0.3/release-notes.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/538507/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1035982'}]
{'cwe_ids': ['CWE-20', 'CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:38Z', 'nvd_published_at': None}
1.4.0
GHSA-hvwm-2624-rp9x
2022-11-17T18:56:52Z
2018-10-30T20:48:58Z
null
['CVE-2018-8006']
Apache ActiveMQ web console vulnerable to Cross-site Scripting
An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-web-console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.15.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8006'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hvwm-2624-rp9x'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/activemq'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f1e41bc9153936e065ca3094bd89ff8167ad2d39ac0b410f24382d2@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c0ec53b72b3240b187afb1cf67e4309a9e5f607282010aa196734814@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'http://activemq.apache.org/security-advisories.data/CVE-2018-8006-announcement.txt'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105156'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:09Z', 'nvd_published_at': '2018-10-10T14:29:00Z'}
1.4.0
GHSA-r4x2-3cq5-hqvp
2022-04-27T13:38:42Z
2018-10-17T16:32:32Z
null
['CVE-2018-8014']
The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins
The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.8'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.32'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.53'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.41'}, {'fixed': '7.0.88'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8014'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2469'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2470'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0450'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0451'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1529'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2205'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r4x2-3cq5-hqvp'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181018-0002/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3665-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4596'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-7.html'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-8.html'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-9.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104203'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040998'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041888'}]
{'cwe_ids': ['CWE-1188'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:40Z', 'nvd_published_at': None}
1.4.0
GHSA-6xh7-4v2w-36q6
2022-04-26T19:07:08Z
2018-10-16T19:58:05Z
null
['CVE-2017-0247']
ASP.NET Core fails to properly validate web requests
A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.1'}, {'fixed': '4.1.2'}]}], 'versions': ['4.1.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.1'}, {'fixed': '4.3.2'}]}], 'versions': ['4.3.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.5.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0247'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/239'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6xh7-4v2w-36q6'}, {'type': 'WEB', 'url': 'https://technet.microsoft.com/en-us/library/security/4021279.aspx'}, {'type': 'WEB', 'url': 'https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:41Z', 'nvd_published_at': '2017-05-12T14:29:00Z'}
1.4.0
GHSA-fmr4-w67p-vh8x
2023-02-13T20:36:36Z
2018-10-19T16:55:35Z
null
['CVE-2018-1047']
Improper Input Validation in org.wildfly:wildfly-undertow
A flaw was found in Wildfly 9.x. A path traversal vulnerability through the org.wildfly.extension.undertow.deployment.ServletResourceManager.getResource method could lead to information disclosure of arbitrary local files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-undertow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1047'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1247'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1248'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1249'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1251'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2018-1047'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1528361'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fmr4-w67p-vh8x'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/WFLY-9620'}]
{'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:49:32Z', 'nvd_published_at': '2018-01-24T23:29:00Z'}
1.4.0
GHSA-rh6x-qvg7-rrmj
2023-02-13T20:41:23Z
2018-10-10T17:23:45Z
null
['CVE-2016-3096']
Link Following in ansible
The create_script function in the lxc_container module in Ansible before 1.9.6-1 and 2.x before 2.0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /opt/.lxc-attach-script, (2) the archived container in the archive_path directory, or the (3) lxc-attach-script.log or (4) lxc-attach-script.err files in the temporary directory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.1.0'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.6.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3096'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-modules-extras/pull/1941'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79f5e55361b885b7efed5bec72d4a4'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1322925'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rh6x-qvg7-rrmj'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/v1.9.6-1/CHANGELOG.md#196-dancing-in-the-street---tbd'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/v2.0.2.0-1/CHANGELOG.md#202-over-the-hills-and-far-away'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21topic/ansible-announce/E80HLZilTU0'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21topic/ansible-announce/tqiZbcWxYig'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201607-14'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183103.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183132.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183252.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183274.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184175.html'}]
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:53Z', 'nvd_published_at': '2016-06-03T14:59:00Z'}
1.4.0
GHSA-4487-x383-qpph
2022-06-24T19:57:13Z
2018-10-17T20:27:47Z
null
['CVE-2018-1272']
Possible privilege escalation in org.springframework:spring-core
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1272'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4487-x383-qpph'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1272'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103697'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:17Z', 'nvd_published_at': '2018-04-06T13:29:00Z'}
1.4.0
GHSA-6fvx-r7hx-3vh6
2022-04-27T14:25:05Z
2018-10-17T18:28:00Z
null
['CVE-2018-15531']
JavaMelody has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java.
JavaMelody before 1.74.0 has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.bull.javamelody:javamelody-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.74.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15531'}, {'type': 'WEB', 'url': 'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6fvx-r7hx-3vh6'}, {'type': 'PACKAGE', 'url': 'https://github.com/javamelody/javamelody'}, {'type': 'WEB', 'url': 'https://github.com/javamelody/javamelody/wiki/ReleaseNotes'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-09-25/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2018/09/25/3'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:10Z', 'nvd_published_at': None}
1.4.0
GHSA-x84v-xcm2-53pg
2022-09-14T21:58:32Z
2018-10-29T19:06:46Z
null
['CVE-2018-18074']
Insufficiently Protected Credentials in Requests
The Requests package through 2.19.1 before 2018-09-14 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.19.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18074'}, {'type': 'WEB', 'url': 'https://github.com/requests/requests/issues/4716'}, {'type': 'WEB', 'url': 'https://github.com/requests/requests/pull/4718'}, {'type': 'WEB', 'url': 'https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2035'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/910766'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x84v-xcm2-53pg'}, {'type': 'PACKAGE', 'url': 'https://github.com/requests/requests'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3790-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3790-2/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://docs.python-requests.org/en/master/community/updates/#release-and-version-history'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html'}]
{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:40Z', 'nvd_published_at': '2018-10-09T17:29:00Z'}
1.4.0
GHSA-8qfc-cvjp-mgpq
2021-09-07T20:29:22Z
2018-10-16T20:53:31Z
null
['CVE-2016-6805']
Moderate severity vulnerability that affects org.apache.ignite:ignite-core
Apache Ignite before 1.9 allows man-in-the-middle attackers to read arbitrary files via XXE in modified update-notifier documents.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ignite:ignite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6805'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8qfc-cvjp-mgpq'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2017/q2/31'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97509'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:22Z', 'nvd_published_at': None}
1.4.0
GHSA-8w4h-3cm3-2pm2
2023-03-01T01:22:59Z
2018-10-09T00:56:26Z
null
['CVE-2018-3745']
Out-of-bounds Read in atob
Versions of `atob` before 2.1.0 uninitialized Buffers when number is passed in input on Node.js 4.x and below. ## Recommendation Update to version 2.1.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'atob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3745'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/321686'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8w4h-3cm3-2pm2'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230622-0009/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/646'}]
{'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:52Z', 'nvd_published_at': '2018-05-29T20:29:00Z'}
1.4.0
GHSA-v7mf-qgxf-qmvf
2022-04-27T13:49:46Z
2018-10-17T17:21:54Z
null
['CVE-2016-8751']
Apache Ranger admin users can store some arbitrary javascript code to be executed when normal users login and access policies
Apache Ranger before 0.6.is vulnerable to a Stored Cross-Site Scripting in when entering custom policy conditions. Admin users can store some arbitrary javascript code to be executed when normal users login and access policies.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8751'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v7mf-qgxf-qmvf'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99067'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:10Z', 'nvd_published_at': None}
1.4.0
GHSA-9r24-gp44-h3pm
2021-09-08T20:54:36Z
2018-10-17T15:43:43Z
null
['CVE-2018-1335']
High severity vulnerability that affects org.apache.tika:tika-core
From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7'}, {'fixed': '1.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1335'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9r24-gp44-h3pm'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b3ed4432380af767effd4c6f27665cc7b2686acccbefeb9f55851dca@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/46540/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104001'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:29Z', 'nvd_published_at': None}
1.4.0
GHSA-h7j7-pw3v-3v3x
2021-09-14T15:43:06Z
2018-10-18T16:49:54Z
null
['CVE-2018-10912']
Moderate severity vulnerability that affects org.keycloak:keycloak-core
keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10912'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h7j7-pw3v-3v3x'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:23Z', 'nvd_published_at': None}
1.4.0
GHSA-j53j-gmr9-h8g3
2021-09-14T18:17:53Z
2018-10-17T15:50:31Z
null
['CVE-2018-8017']
Moderate severity vulnerability that affects org.apache.tika:tika-core
In Apache Tika 1.2 to 1.18, a carefully crafted file can trigger an infinite loop in the IptcAnpaParser.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'fixed': '1.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8017'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j53j-gmr9-h8g3'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tika'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/72df7a3f0dda49a912143a1404b489837a11f374dfd1961061873a91@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105513'}]
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:01Z', 'nvd_published_at': None}
1.4.0
GHSA-jv74-f9pj-xp3f
2022-11-17T19:14:08Z
2018-10-16T23:07:57Z
null
['CVE-2018-8041']
Apache Camel's Mail is vulnerable to path traversal
Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 and 2.22.0 is vulnerable to path traversal.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20.0'}, {'fixed': '2.20.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.21.0'}, {'fixed': '2.21.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.22.0'}, {'fixed': '2.22.1'}]}], 'versions': ['2.22.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8041'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jv74-f9pj-xp3f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-12630'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2018-8041.txt.asc?version=1&modificationDate=1536746339000&api=v2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105352'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:10Z', 'nvd_published_at': None}
1.4.0
GHSA-v76m-f5cx-8rg4
2020-06-16T21:57:07Z
2018-10-16T19:33:25Z
null
['CVE-2015-1566']
Moderate severity vulnerability that affects DotNetNuke.Core
Cross-site scripting (XSS) vulnerability in DotNetNuke (DNN) before 7.4.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1566'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v76m-f5cx-8rg4'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/62832'}, {'type': 'WEB', 'url': 'http://www.dnnsoftware.com/platform/manage/security-center'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:07Z', 'nvd_published_at': None}
1.4.0
GHSA-m956-frf4-m2wr
2022-07-15T18:33:52Z
2018-10-10T17:22:53Z
null
['CVE-2016-9587']
Ansible is vulnerable to an improper input validation in Ansible's handling of data sent from client systems
Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.3.0'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0.0'}, {'fixed': '2.2.1.0'}]}], 'versions': ['2.2.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9587'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0448'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0515'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1685'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9587'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m956-frf4-m2wr'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2018-39.yaml'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-77'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/41013/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0195.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0260.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95352'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:38Z', 'nvd_published_at': '2018-04-24T16:29:00Z'}
1.4.0
GHSA-6xq8-pvg4-3mf3
2022-09-14T19:17:28Z
2018-10-19T16:54:11Z
null
['CVE-2018-1000644']
Eclipse RDF4j vulnerable to XML External Entitiy
Eclipse RDF4j version < 2.4.0 Milestone 2 contains a XML External Entity (XXE) vulnerability in RDF4j XML parser parsing RDF files that can result in the disclosure of confidential data, denial of service, server side request forgery, port scanning. This attack appear to be exploitable via Specially crafted RDF file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.rdf4j:rdf4j-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000644'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/rdf4j/issues/1056'}, {'type': 'WEB', 'url': 'https://0dd.zone/2018/08/05/rdf4j-XXE/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6xq8-pvg4-3mf3'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/rdf4j'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:48Z', 'nvd_published_at': None}
1.4.0
GHSA-xv6v-72hh-g6g2
2020-06-16T22:04:31Z
2018-10-18T17:22:26Z
2020-06-16T22:04:31Z
['CVE-2018-1000643']
Moderate severity vulnerability that affects org.owasp.antisamy:antisamy
OWASP OWASP ANTISAMY version 1.5.7 and earlier contains a Cross Site Scripting (XSS) vulnerability in AntiSamy.scan() - for both SAX & DOM that can result in Cross Site Scripting.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.antisamy:antisamy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000643'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xv6v-72hh-g6g2'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:31Z', 'nvd_published_at': None}
1.4.0
GHSA-vq9j-jh62-5hmp
2022-04-26T21:36:33Z
2018-10-16T23:13:11Z
null
['CVE-2017-5643']
Apache Camel using an outdated vulnerable JSON-lib library
Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.17.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.18.0'}, {'fixed': '2.18.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5643'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vq9j-jh62-5hmp'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2017-5643.txt.asc?version=1&modificationDate=1489652454000&api=v2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97226'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:03Z', 'nvd_published_at': None}
1.4.0
GHSA-758m-6g3q-g3hh
2022-04-27T13:54:27Z
2018-10-17T17:22:38Z
null
['CVE-2017-7676']
Policy resource matcher in Apache Ranger before 0.7.1 ignores characters after '' wildcard character
Policy resource matcher in Apache Ranger before 0.7.1 ignores characters after '*' wildcard character - like my*test, test*.txt. This can result in unintended behavior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7676'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-758m-6g3q-g3hh'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98958'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:27Z', 'nvd_published_at': None}
1.4.0
GHSA-3pph-2595-cgfh
2022-04-27T14:43:36Z
2018-10-17T19:55:46Z
null
['CVE-2018-1308']
There is a XML external entity expansion (XXE) vulnerability in Apache Solr
This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 relates to an XML external entity expansion (XXE) in the `&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'fixed': '6.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1308'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3pph-2595-cgfh'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-11971'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/www-announce/201804.mbox/%3C000001d3cf68%245ac69af0%241053d0d0%24%40apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4194'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:43Z', 'nvd_published_at': None}
1.4.0
GHSA-qxxx-2pp7-5hmx
2023-08-28T10:55:45Z
2018-10-16T17:21:35Z
null
['CVE-2017-7525']
jackson-databind is vulnerable to a deserialization flaw
A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.7.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7525'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/1599'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/1723'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1834'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1835'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1836'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1837'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1839'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1840'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2477'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2546'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2547'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2633'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2635'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2636'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2637'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2638'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3141'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3454'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3458'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0294'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0342'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1449'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1450'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0910'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1462702'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-055'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qxxx-2pp7-5hmx'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3c87dc8bca99a2b3b4743713b33d1de05b1d6b761fdf316224e9c81f@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4641ed8616ccc2c1fbddac2c3dc9900c96387bc226eaf0232d61909b@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5008bcbd45ee65ce39e4220b6ac53d28a24d6bc67d5804e9773a7399@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b1f33fe5ade396bb903fdcabe9f243f7692c7dfce5418d3743c2d346@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c2ed4c0126b43e324cf740012a0edd371fd36096fd777be7bfe7a2a6@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c9d5ff20929e8a3c8794facf4c4b326a9c10618812eec356caa20b87@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f60afd3c7e9ebaaf70fad4a4beb75cf8740ac959017a31e7006c7486@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6ae1cd4b5fea7aed9830dc6f6d58228fed7@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf7f87810c38dc9abf9f93989f76008f504cbf7c1a355214640b2d04c@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20171214-0002/'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2017/dsa-4004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99623'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039744'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039947'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040360'}]
{'cwe_ids': ['CWE-184', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:14Z', 'nvd_published_at': '2018-02-06T15:29:00Z'}
1.4.0
GHSA-8p5p-ff7x-hw7q
2021-09-07T20:23:14Z
2018-10-10T17:27:58Z
null
['CVE-2018-3747']
Cross-Site Scripting in public
Versions of `public` prior to 0.1.4 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation Upgrade to version 0.1.4 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'public'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3747'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/316346'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/329950'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8p5p-ff7x-hw7q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1000'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:09Z', 'nvd_published_at': None}
1.4.0
GHSA-4cj8-g9cp-v5wr
2022-09-14T19:19:04Z
2018-10-22T18:53:56Z
null
['CVE-2018-9206']
Unrestricted Upload of File with Dangerous Type in blueimp-file-upload
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'blueimp-file-upload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.22.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-9206'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4cj8-g9cp-v5wr'}, {'type': 'WEB', 'url': 'https://wpvulndb.com/vulnerabilities/9136'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45790/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/46182/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105679'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106629'}, {'type': 'WEB', 'url': 'http://www.vapidlabs.com/advisory.php?v=204'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:08Z', 'nvd_published_at': None}
1.4.0
GHSA-hr2v-3952-633q
2021-09-14T17:26:45Z
2018-10-09T00:44:59Z
null
['CVE-2018-3750']
Prototype Pollution in deep-extend
Versions of `deep-extend` before 0.5.1 are vulnerable to prototype pollution. ## Recommendation Update to version 0.5.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'deep-extend'}, 'ecosystem_specific': {'affected_functions': ['deep-extend']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3750'}, {'type': 'WEB', 'url': 'https://github.com/unclechu/node-deep-extend/commit/9423fae877e2ab6b4aecc4db79a0ed63039d4703'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/311333'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hr2v-3952-633q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/612'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:53Z', 'nvd_published_at': None}
1.4.0
GHSA-84cm-x2q5-8225
2023-09-27T12:57:00Z
2018-10-15T22:03:48Z
null
['CVE-2018-15494']
dojox vulnerable to unescaped string injection
In Dojo Toolkit before 1.14.0, there is unescaped string injection in dojox/Grid/DataGrid.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15494'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojox/pull/283'}, {'type': 'WEB', 'url': 'https://dojotoolkit.org/blog/dojo-1-14-released'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-84cm-x2q5-8225'}, {'type': 'PACKAGE', 'url': 'https://github.com/dojo/dojox'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/09/msg00002.html'}]
{'cwe_ids': ['CWE-116'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:12Z', 'nvd_published_at': None}
1.4.0
GHSA-xv7x-x6wr-xx7g
2021-09-22T16:46:50Z
2018-10-17T17:22:05Z
null
['CVE-2016-8746']
Moderate severity vulnerability that affects org.apache.ranger:ranger
Apache Ranger before 0.6.3 policy engine incorrectly matches paths in certain conditions when policy does not contain wildcards and has recursion flag set to true.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8746'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xv7x-x6wr-xx7g'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95998'}]
{'cwe_ids': ['CWE-426'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:33Z', 'nvd_published_at': None}
1.4.0
GHSA-r97x-3g8f-gx3m
2022-04-27T13:27:33Z
2018-10-17T16:23:50Z
null
['CVE-2016-1000340']
The Bouncy Castle JCE Provider carry a propagation bug
In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so there was the possibility of rare (in general usage) spurious calculations for elliptic curve scalar multiplications. Such errors would have been detected with high probability by the output validation for our scalar multipliers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.51'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.51'}, {'fixed': '1.56'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000340'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r97x-3g8f-gx3m'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:10Z', 'nvd_published_at': None}
1.4.0
GHSA-qhqf-ghgh-x2m4
2021-10-08T21:18:12Z
2018-10-16T19:57:38Z
null
['CVE-2017-0249']
High severity vulnerability that affects Microsoft.AspNetCore.Mvc
See https://nvd.nist.gov/vuln/detail/CVE-2017-0249 & https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0249
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.1'}, {'fixed': '4.1.2'}]}], 'versions': ['4.1.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.1'}, {'fixed': '4.3.2'}]}], 'versions': ['4.3.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'DisCatSharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.8.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0249'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/239'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qhqf-ghgh-x2m4'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:02Z', 'nvd_published_at': '2017-05-12T14:29:00Z'}
1.4.0
GHSA-whw7-h25v-9qvx
2020-06-16T22:00:38Z
2018-10-18T16:56:38Z
null
['CVE-2017-7661']
Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fediz:fediz-jetty9, and org.apache.cxf.fediz:fediz-spring2
Apache CXF Fediz ships with a number of container-specific plugins to enable WS-Federation for applications. A CSRF (Cross Style Request Forgery) style vulnerability has been found in the Spring 2, Spring 3, Jetty 8 and Jetty 9 plugins in Apache CXF Fediz prior to 1.4.0, 1.3.2 and 1.2.4.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-jetty9'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-jetty8'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7661'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-whw7-h25v-9qvx'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2017-7661.txt.asc'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1038497'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:38Z', 'nvd_published_at': '2017-05-16T17:29:00Z'}
1.4.0
GHSA-6mx3-3vqg-hpp2
2023-09-05T18:37:43Z
2018-10-03T20:07:39Z
null
['CVE-2018-16984']
Django allows unprivileged users to read the password hashes of arbitrary accounts
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16984'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6mx3-3vqg-hpp2'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190502-0009/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200517123022/http://www.securitytracker.com/id/1041749'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2018/oct/01/security-release/'}]
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:52Z', 'nvd_published_at': None}
1.4.0
GHSA-wgmx-52ph-qqcw
2023-08-31T21:42:54Z
2018-10-10T16:05:23Z
null
['CVE-2018-10895']
Qutebrowser CSRF Vulnerability
qutebrowser before version 1.4.1 is vulnerable to a cross-site request forgery flaw that allows websites to access `qute://*` URLs. A malicious website could exploit this to load a `qute://settings/set` URL, which then sets `editor.command` to a bash script, resulting in arbitrary code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'qutebrowser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10895'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/43e58ac865ff862c2008c510fc5f7627e10b4660'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wgmx-52ph-qqcw'}, {'type': 'PACKAGE', 'url': 'https://github.com/qutebrowser/qutebrowser'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:28Z', 'nvd_published_at': None}
1.4.0
GHSA-778x-2mqv-w6xw
2020-06-16T21:21:49Z
2018-10-18T16:48:01Z
null
['CVE-2016-8629']
Moderate severity vulnerability that affects org.keycloak:keycloak-core
Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8629'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0872'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0873'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1388988'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-778x-2mqv-w6xw'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0876.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97392'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1038180'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:49Z', 'nvd_published_at': None}
1.4.0
GHSA-qcj7-g2j5-g7r3
2022-04-27T13:28:09Z
2018-10-17T16:24:12Z
null
['CVE-2016-1000342']
In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification
In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000342'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qcj7-g2j5-g7r3'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3727-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:36Z', 'nvd_published_at': None}
1.4.0
GHSA-m929-7fr6-cvjg
2022-04-27T13:58:00Z
2018-10-17T17:23:36Z
null
['CVE-2018-1259']
Spring Data Commons, used in combination with XMLBeam, contains a property binder vulnerability caused by improper restriction of XML external entity references
Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1259'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1809'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m929-7fr6-cvjg'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1259'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:35Z', 'nvd_published_at': '2018-05-11T20:29:00Z'}
1.4.0
GHSA-h6rp-8v4j-hwph
2023-02-15T22:19:51Z
2018-10-16T23:13:49Z
null
['CVE-2014-0003']
Apache Camel's XSLT component allows remote attackers to execute arbitrary Java methods
The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0'}, {'fixed': '2.12.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0003'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229061309/http://www.securityfocus.com/bid/65902'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0245.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0254.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0371.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0372.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:14Z', 'nvd_published_at': '2014-03-21T04:38:00Z'}
1.4.0
GHSA-g8j6-m4p7-5rfq
2021-09-10T20:29:38Z
2018-10-16T17:18:12Z
null
['CVE-2017-0929']
High severity vulnerability that affects DotNetNuke.Core
DNN (aka DotNetNuke) before 9.2.0 suffers from a Server-Side Request Forgery (SSRF) vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0929'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g8j6-m4p7-5rfq'}, {'type': 'PACKAGE', 'url': 'https://github.com/dnnsoftware/Dnn.Platform'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:32Z', 'nvd_published_at': None}
1.4.0
GHSA-qvxv-pmq9-4q7g
2021-09-16T21:08:26Z
2018-10-19T16:51:11Z
null
['CVE-2017-15288']
High severity vulnerability that affects org.scala-lang:scala-compiler
The compilation daemon in Scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${USER:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.scala-lang:scala-compiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.scala-lang:scala-compiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.scala-lang:scala-compiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0'}, {'fixed': '2.12.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15288'}, {'type': 'WEB', 'url': 'https://github.com/scala/scala/pull/6108'}, {'type': 'WEB', 'url': 'https://github.com/scala/scala/pull/6120'}, {'type': 'WEB', 'url': 'https://github.com/scala/scala/pull/6128'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qvxv-pmq9-4q7g'}, {'type': 'PACKAGE', 'url': 'https://github.com/scala/scala'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r10dd8e5b3bbe3bb531aa4a65472ce56f91efbb77ea9fe04bb8272e2c@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r18a05115cfa078c0f4e5c1ea2e8d64804f63e0095aa2174a3afecc0f@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d51eae81ceb7bfd1780936a48b460ab31d53ff2ed526a88a7f60fe4@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r32e0b1d5ff43ac3ed4b179a4e663022d1c5ccac77884a99ea149e633@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33665e9213cc6df1e48c3d99d1b0c7a3203e9bd0ef4fc4ba838bcb04@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f10022ec972c8df29a950d1a591c16562eeddd9194d3010e46b9b76@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5a1418a4f5101f5af3fc14bf358c54f2c7200e6a3701de2e2f581e1b@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r628ea3ea2fed4d9c1c5232a0b1ed108a15abc9fd2f0aaca1e8cc9164@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re72f4d04dfc398aae0e38dbfeccf44780df2782623a610cbfcec6f3a@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf57e4d7211b30e51803911304f3b7b54393f7a4bd60bb0784c31eec1@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201812-08'}, {'type': 'WEB', 'url': 'http://scala-lang.org/news/security-update-nov17.html'}]
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:54Z', 'nvd_published_at': '2017-11-15T16:29:00Z'}
1.4.0
GHSA-xpwp-rq3x-x6v7
2020-06-16T22:03:58Z
2018-10-16T17:35:04Z
null
['CVE-2017-0907']
Critical severity vulnerability that affects recurly-api-client
The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeUriString" that could result in compromise of API keys or other critical resources.
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.10'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.8'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.14'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.1'}]}], 'versions': ['1.7.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'recurly-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.1'}]}], 'versions': ['1.8.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0907'}, {'type': 'WEB', 'url': 'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288635'}, {'type': 'WEB', 'url': 'https://dev.recurly.com/page/net-updates'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xpwp-rq3x-x6v7'}]
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:58Z', 'nvd_published_at': None}
1.4.0
GHSA-cx8m-8xmx-q8v3
2023-09-12T18:51:51Z
2018-10-10T17:25:12Z
null
['CVE-2018-3767']
Denial of Service in memjs
Versions of `memjs` prior to 1.2.2 are vulnerable to Denial of Service (DoS). The package fails to sanitize the `value` option passed to the Buffer constructor, which may allow attackers to pass large values exhausting system resources. ## Recommendation Upgrade to version 1.2.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'memjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3767'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319809'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cx8m-8xmx-q8v3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/970'}]
{'cwe_ids': ['CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:11Z', 'nvd_published_at': None}
1.4.0
GHSA-4r7g-7cpj-5jr7
2023-08-28T10:50:19Z
2018-10-19T16:41:15Z
null
['CVE-2017-15701']
Apache Qpid Broker-J vulnerable to Denial of Service (DoS) via uncontrolled resource consumption
In Apache Qpid Broker-J versions 6.1.0 through 6.1.4 (inclusive) the broker does not properly enforce a maximum frame size in AMQP 1.0 frames. A remote unauthenticated attacker could exploit this to cause the broker to exhaust all available memory and eventually terminate. Older AMQP protocols are not affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-broker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15701'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4r7g-7cpj-5jr7'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/qpid-broker-j'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/QPID-7947'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4054e1c90993f337eeea24a312841c0661653e673c0ff8e2cd9520fe@%3Cdev.qpid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://qpid.apache.org/cves/CVE-2017-15701.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102041'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:59Z', 'nvd_published_at': None}
1.4.0
GHSA-w6gv-3r3v-gwgj
2023-09-07T20:31:12Z
2018-10-18T16:47:41Z
null
['CVE-2017-2585']
keycloak-core vulnerable to timing attacks against JWS token verification
Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2585'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0872'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0873'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1412376'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w6gv-3r3v-gwgj'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170420113802/http://www.securitytracker.com/id/1038180'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227175650/http://www.securityfocus.com/bid/97393'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0876.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:50Z', 'nvd_published_at': None}
1.4.0
GHSA-rf7q-xqm3-6923
2022-04-27T13:48:55Z
2018-10-17T17:21:37Z
null
['CVE-2016-5395']
Apache Ranger allows remote authenticated administrators to inject arbitrary web script or HTML
Cross-site scripting (XSS) vulnerability in the create user functionality in the policy admin tool in Apache Ranger before 0.6.1 allows remote authenticated administrators to inject arbitrary web script or HTML via vectors related to policies.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5395'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rf7q-xqm3-6923'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/92577'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:33Z', 'nvd_published_at': None}
1.4.0
GHSA-9prh-257w-9277
2021-09-08T20:16:46Z
2018-10-23T17:20:12Z
null
['CVE-2015-8861']
Cross-Site Scripting in handlebars
Versions of `handlebars` prior to 4.0.0 are affected by a cross-site scripting vulnerability when attributes in handlebar templates are not quoted. ## Proof of Concept Template: ```<a href={{foo}}/>``` Input: ```{ 'foo' : 'test.com onload=alert(1)'}``` Rendered result: ```<a href=test.com onload=alert(1)/>``` ## Recommendation Update to version 4.0.0 or later. Alternatively, ensure that all attributes in handlebars templates are encapsulated with quotes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8861'}, {'type': 'WEB', 'url': 'https://github.com/wycats/handlebars.js/pull/1083'}, {'type': 'WEB', 'url': 'https://blog.srcclr.com/handlebars_vulnerability_research_findings/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9prh-257w-9277'}, {'type': 'PACKAGE', 'url': 'https://github.com/wycats/handlebars.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/61'}, {'type': 'WEB', 'url': 'https://www.sourceclear.com/blog/handlebars_vulnerability_research_findings/'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2016-18'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96434'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:14Z', 'nvd_published_at': None}
1.4.0
GHSA-ffjh-fjgg-mfpq
2021-09-10T18:07:43Z
2018-10-17T17:22:49Z
null
['CVE-2017-7677']
Moderate severity vulnerability that affects org.apache.ranger:ranger
In environments that use external location for hive tables, Hive Authorizer in Apache Ranger before 0.7.1 should be checking RWX permission for create table.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7677'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ffjh-fjgg-mfpq'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98961'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:28Z', 'nvd_published_at': None}
1.4.0
GHSA-93jq-624g-4p9p
2022-09-14T19:16:10Z
2018-10-19T16:50:50Z
null
['CVE-2017-14063']
Improper Input Validation in async-http-client
Async Http Client (aka async-http-client) before 2.0.35 can be tricked into connecting to a host different from the one extracted by java.net.URI if a '?' character occurs in a fragment identifier. Similar bugs were previously identified in cURL (CVE-2016-8624) and Oracle Java 8 java.net.URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.asynchttpclient:async-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.35'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14063'}, {'type': 'WEB', 'url': 'https://github.com/AsyncHttpClient/async-http-client/issues/1455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'PACKAGE', 'url': 'https://github.com/AsyncHttpClient/async-http-client'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-93jq-624g-4p9p'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04b15fd898a6b1612153543375daaa8145a0fd1804ec9fa2e0d95c97@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a6b6429a7558051dbb70bd06584b4b1c334a80ec9203d3d39b7045a@%3Ccommits.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r14a74d204f285dd3a4fa203de6dbb4e741ddb7fdfff7915590e5b3db@%3Cdev.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3df4b7ccc363b4850a24842138117aa4451b875bc4773a845b828fc6@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r41a0e2c36f7d1854a4d56cb1e4aa720ef501782d887ece1c9b1e2d60@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ebb9596d890f3528630492bd78237b3eef06f093bac238a0da9b630@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b8666c4414500ff6e993bfa69cb6afa19b1b67c4585a045c0c21662@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f07c30721503d4c02d5451f77a611a1a0bb2a94ddcdf071c9485ea3@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f794dc07913c5f2ec08f540813b40e61b562d36f8b1f916e8705c56@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r683d78c6d7a15659f2bb82dd4120dab8c45a870eaa7f1a15cce4ed3b@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7046a51116207588e36ca8c2e291327e391dae40712d267117475a98@%3Cdev.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7879a48644f708be0529bd39f0679ad3ad951f3dc24442878a008fd8@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79d9bab405414af45568c4683386f5e9fd02c10ca87ffa2ee33512dc@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r868875e67494a18d31e88cba2672f45c3fc6708ffdde445723004da4@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ea5d489e004b40baf73880c4e11dd4de24b799d15e091e1f4017108@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbbad61e1ba5b21e234a6664963618acfee237af754eb20300d938e1e@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc4fbb06ccb10e26e6064f57f6bd4935eabe2d18a0cb9a7183699396@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc550b8955b37b40fee18db99f167337c41c930d8c3763b9631e01dda@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb46acc25917e01ebecca132e870da9ab935d5796686ed8a2785b026@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re2510852c4a1f635b14b35e5dfd7597076928e723ab08559ede575e0@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re7367895ccbf64523efcd39a9181baf2eaa30b069d8d6496852fba56@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd823a733b02cffbef5a69953fdcbed2d1d0afad5e1ea4e96ff6bf0a@%3Cissues.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe55d83e4070bcc9285bbbf6bc39635dbcbba6d14d89aab0f339c83a@%3Ccommits.tez.apache.org%3E'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2017/08/31/4'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:19Z', 'nvd_published_at': None}
1.4.0
GHSA-crvj-3gj9-gm2p
2020-06-16T21:43:40Z
2018-10-09T00:44:29Z
2020-06-16T21:32:53Z
[]
High severity vulnerability that affects qs
Withdrawn, accidental duplicate publish. The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array.
[]
[{'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7191'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-crvj-3gj9-gm2p'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:53Z', 'nvd_published_at': None}
1.4.0
GHSA-37q6-576q-vgr7
2021-08-31T20:51:48Z
2018-10-30T20:36:53Z
null
['CVE-2018-14731']
Missing Origin Validation in parcel-bundler
Versions of `parcel-bundler` before 1.10.0 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated. ## Recommendation Update to version 1.10.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'parcel-bundler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14731'}, {'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/issues/1783'}, {'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/pull/1794'}, {'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4'}, {'type': 'WEB', 'url': 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages'}, {'type': 'WEB', 'url': 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-37q6-576q-vgr7'}, {'type': 'PACKAGE', 'url': 'https://github.com/parcel-bundler/parcel'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/721'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:24Z', 'nvd_published_at': None}
1.4.0
GHSA-rvgg-f8qm-6h7j
2020-06-16T21:55:57Z
2018-10-17T16:19:43Z
null
['CVE-2018-12540']
High severity vulnerability that affects io.vertx:vertx-web
In version from 3.0.0 to 3.5.2 of Eclipse Vert.x, the CSRFHandler do not assert that the XSRF Cookie matches the returned XSRF header/form parameter. This allows replay attacks with previously issued tokens which are not expired yet.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12540'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2371'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536948'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rvgg-f8qm-6h7j'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r10aef585c521f8ef603f5831f9d97a27d920624025131da950e0c62f@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3fffda8e947edaa359152c8dc4c4ea9c96fd8ced1999bbce92bc6b25@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r59482ebed302aa49ac7e0c51737499746b0d086fcdeb8f90e705951f@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc5b4ae8a7caae6d3d5b3266cb050823b96dd62b30718b90b778d3d8b@%3Ccommits.pulsar.apache.org%3E'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:57Z', 'nvd_published_at': None}
1.4.0
GHSA-g556-x5vx-qh59
2022-09-14T19:15:38Z
2018-10-19T16:50:33Z
null
['CVE-2017-1000498']
Android SVG vulnerable to XML External Entity (XXE)
AndroidSVG version 1.2.2 is vulnerable to XXE attacks in the SVG parsing component resulting in denial of service and possibly remote code execution
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.caverock:androidsvg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000498'}, {'type': 'WEB', 'url': 'https://github.com/BigBadaboom/androidsvg/issues/122'}, {'type': 'PACKAGE', 'url': 'https://github.com/BigBadaboom/androidsvg'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g556-x5vx-qh59'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:09Z', 'nvd_published_at': None}
1.4.0
GHSA-wfcc-pff6-rgc5
2023-08-15T20:33:37Z
2018-10-19T16:15:46Z
null
['CVE-2017-9735']
Jetty vulnerable to exposure of sensitive information due to observable discrepancy
Jetty through 9.4.x contains a timing channel attack in `util/security/Password.java`, which allows attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.6.v20170531'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.5.v20170502'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.20.v20170531'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.3.19.v20170502'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.22.v20170606'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.21.v20170120'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9735'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/issues/1556'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/commit/042f325f1cd6e7891d72c7e668f5947b5457dc02'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/864631'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/36870f6c51f5bc25e6f7bb1fcace0e57e81f1524019b11f466738559@%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f887a5978f5e4c62b9cfe876336628385cff429e796962649649ec8a@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170826163336/http://www.securityfocus.com/bid/99104'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]
{'cwe_ids': ['CWE-200', 'CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:10Z', 'nvd_published_at': '2017-06-16T21:29:00Z'}
1.4.0
GHSA-qv32-7r6p-xhhh
2021-09-16T21:06:35Z
2018-10-19T16:39:29Z
null
['CVE-2016-4216']
Moderate severity vulnerability that affects com.adobe.xmp:xmpcore
XMPCore in Adobe XMP Toolkit for Java before 5.1.3 allows remote attackers to read arbitrary files via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.adobe.xmp:xmpcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4216'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qv32-7r6p-xhhh'}, {'type': 'WEB', 'url': 'https://helpx.adobe.com/security/products/xmpcore/apsb16-24.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/91717'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:48Z', 'nvd_published_at': None}
1.4.0
GHSA-9qgc-p27w-3hjg
2021-09-08T20:46:55Z
2018-10-22T20:37:07Z
null
['CVE-2018-16131']
High severity vulnerability that affects com.typesafe.akka:akka-http-core_2.11 and com.typesafe.akka:akka-http-core_2.12
The decodeRequest and decodeRequestWith directives in Lightbend Akka HTTP 10.1.x through 10.1.4 and 10.0.x through 10.0.13 allow remote attackers to cause a denial of service (memory consumption and daemon crash) via a ZIP bomb.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.akka:akka-http-core_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0'}, {'fixed': '10.1.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.akka:akka-http-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0'}, {'fixed': '10.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16131'}, {'type': 'WEB', 'url': 'https://github.com/akka/akka-http/issues/2137'}, {'type': 'WEB', 'url': 'https://akka.io/blog/news/2018/08/30/akka-http-dos-vulnerability-found'}, {'type': 'WEB', 'url': 'https://doc.akka.io/docs/akka-http/current/security/2018-09-05-denial-of-service-via-decodeRequest.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9qgc-p27w-3hjg'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/akka-security/Dj7INsYWdjg'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:22Z', 'nvd_published_at': None}
1.4.0
GHSA-5mf7-26mw-3rqr
2021-09-01T22:17:57Z
2018-10-17T15:50:45Z
null
['CVE-2018-1338']
Moderate severity vulnerability that affects org.apache.tika:tika-core
A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's BPGParser in versions of Apache Tika before 1.18.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1338'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5mf7-26mw-3rqr'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4d20c5748fb9f836653bc78a1bad991ba8485d82a1e821f70b641932@%3Cdev.tika.apache.org%3E'}]
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:41Z', 'nvd_published_at': None}
1.4.0
GHSA-6v52-mj5r-7j2m
2021-09-02T18:25:29Z
2018-10-17T16:33:02Z
null
['CVE-2018-8037']
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.5'}, {'fixed': '8.5.32'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8037'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2867'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2868'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1529'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6v52-mj5r-7j2m'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2ee3af8a43cb019e7898c9330cc8e73306553a27f2e4735dfb522d39@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5d15316dfb4adf75d96d394745f8037533fa3bcc1ac8f619bf5c044c@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180817-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4281'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090623.GA92700%40minotaur.apache.org%3E'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201808.mbox/%3C0c616b4d-4e81-e7f8-b81d-1bb4c575aa33%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104894'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041376'}]
{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:12Z', 'nvd_published_at': None}
1.4.0
GHSA-f2j6-wrhh-v25m
2023-08-07T17:20:38Z
2018-10-10T16:10:10Z
null
['CVE-2018-1000805']
Paramiko Authentication Bypass vulnerability
Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000805'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/issues/1283'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2018:3497'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3347'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3406'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3505'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f2j6-wrhh-v25m'}, {'type': 'PACKAGE', 'url': 'https://github.com/paramiko/paramiko'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/wp-content/uploads/sites/4/usd20180023.txt'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3796-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3796-2/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3796-3/'}]
{'cwe_ids': ['CWE-732', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:26Z', 'nvd_published_at': '2018-10-08T15:29:00Z'}
1.4.0
GHSA-q7pf-qr96-2vq5
2022-09-14T19:14:55Z
2018-10-19T16:46:41Z
null
['CVE-2017-1000208']
Deserialization of Untrusted Data in swagger-parser
A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.swagger:swagger-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.swagger:swagger-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000208'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q7pf-qr96-2vq5'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-parser'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-parser/releases/tag/v1.0.31'}, {'type': 'WEB', 'url': 'https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:22Z', 'nvd_published_at': None}
1.4.0
GHSA-6pcc-3rfx-4gpm
2022-04-26T18:43:56Z
2018-10-16T17:01:25Z
null
['CVE-2018-1000632']
Dom4j contains a XML Injection vulnerability
dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later. Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.dom4j:dom4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.dom4j:dom4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}], 'versions': ['2.1.0']}, {'package': {'ecosystem': 'Maven', 'name': 'dom4j:dom4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000632'}, {'type': 'WEB', 'url': 'https://github.com/dom4j/dom4j/issues/48'}, {'type': 'WEB', 'url': 'https://github.com/dom4j/dom4j/commit/c2a99d7dee8ce7a4e5bef134bb781a6672bd8a0f'}, {'type': 'WEB', 'url': 'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0362'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0364'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0365'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0380'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1160'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1161'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1162'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3172'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6pcc-3rfx-4gpm'}, {'type': 'PACKAGE', 'url': 'https://github.com/dom4j/dom4j/'}, {'type': 'WEB', 'url': 'https://ihacktoprotect.com/post/dom4j-xml-injection/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/00571f362a7a2470fba50a31282c65637c40d2e21ebe6ee535a4ed74@%3Ccommits.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4a77652531d62299a30815cf5f233af183425db8e3c9a824a814e768@%3Cdev.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5a020ecaa3c701f408f612f7ba2ee37a021644c4a39da2079ed3ddbc@%3Ccommits.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7e9e78f0e4288fac6591992836d2a80d4df19161e54bd71ab4b8e458@%3Cdev.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7f6e120e6ed473f4e00dde4c398fc6698eb383bd7857d20513e989ce@%3Cdev.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9d4c1af6f702c3d6d6f229de57112ddccac8ce44446a01b7937ab9e0@%3Ccommits.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d7d960b2778e35ec9b4d40c8efd468c7ce7163bcf6489b633491c89f@%3Cdev.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/09/msg00028.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOOVVCRQE6ATFD2JM2EMDXOQXTRIVZGP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJULAHVR3I5SX7OSMXAG75IMNSAYOXGA/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}]
{'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:56Z', 'nvd_published_at': '2018-08-20T19:31:00Z'}
1.4.0
GHSA-p8jx-x2vw-wm33
2021-09-16T16:13:14Z
2018-10-17T19:48:06Z
null
['CVE-2018-1331']
High severity vulnerability that affects org.apache.storm:storm-core
In Apache Storm 0.10.0 through 0.10.2, 1.0.0 through 1.0.6, 1.1.0 through 1.1.2, and 1.2.0 through 1.2.1, an attacker with access to a secure storm cluster in some cases could execute arbitrary code as a different user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1331'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p8jx-x2vw-wm33'}, {'type': 'WEB', 'url': 'http://storm.apache.org/2018/06/04/storm113-released.html'}, {'type': 'WEB', 'url': 'http://storm.apache.org/2018/06/04/storm122-released.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2018/07/10/4'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104732'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041273'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:34Z', 'nvd_published_at': None}
1.4.0
GHSA-3357-829x-m9pr
2022-09-13T23:37:01Z
2018-10-18T16:57:00Z
null
['CVE-2015-5175']
Apache CXF Fediz application plugins are vulnerable to Denial of Service (DoS) attacks
Application plugins in Apache CXF Fediz prior to version 1.1.3 and 1.2.x prior to 1.2.1 allow remote attackers to create a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-idp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-idp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'fixed': '1.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5175'}, {'type': 'WEB', 'url': 'https://github.com/apache/cxf-fediz/commit/f65c961ea31e3c1851daba8e7e49fc37bbf77b19'}, {'type': 'WEB', 'url': 'https://cxf.apache.org/security-advisories.data/CVE-2015-5175.txt.asc?version=1&modificationDate=1440598018000&api=v2'}, {'type': 'WEB', 'url': 'https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git;a=commit;h=f65c961ea31e3c1851daba8e7e49fc37bbf77b19'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3357-829x-m9pr'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/cxf-dev/201508.mbox/%3CCAB8XdGAx=VL_uepDSecE2h8ggTD4kpagXnyfegVjt7Axi_Ossw@mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/08/26/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/76486'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:50Z', 'nvd_published_at': '2017-06-07T20:29:00Z'}
1.4.0
GHSA-vgg8-72f2-qm23
2021-06-10T20:19:49Z
2018-10-19T16:15:34Z
null
['CVE-2017-7657']
Critical severity vulnerability that affects org.eclipse.jetty:jetty-server
In Eclipse Jetty, versions 9.2.x and older, 9.3.x, transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.25.v20180606'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.25.v20180105'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.24.v20180605'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.3.23.v20180228'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7657'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0910'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535668'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vgg8-72f2-qm23'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181014-0001/'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4278'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041194'}]
{'cwe_ids': ['CWE-190', 'CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:40Z', 'nvd_published_at': '2018-06-26T16:29:00Z'}
1.4.0
GHSA-fjqm-246c-mwqg
2022-04-27T13:35:24Z
2018-10-17T16:27:28Z
null
['CVE-2016-1000346']
In Bouncy Castle JCE Provider the other party DH public key is not fully validated
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000346'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fjqm-246c-mwqg'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3727-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:48Z', 'nvd_published_at': None}
1.4.0
GHSA-76qr-mmh8-cp8f
2021-09-02T19:24:32Z
2018-10-19T16:56:00Z
null
['CVE-2018-9159']
Moderate severity vulnerability that affects com.sparkjava:spark-core
In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.sparkjava:spark-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-9159'}, {'type': 'WEB', 'url': 'https://github.com/perwendel/spark/issues/981'}, {'type': 'WEB', 'url': 'https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668'}, {'type': 'WEB', 'url': 'https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd'}, {'type': 'WEB', 'url': 'https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2020'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2405'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-76qr-mmh8-cp8f'}, {'type': 'PACKAGE', 'url': 'https://github.com/perwendel/spark'}, {'type': 'WEB', 'url': 'http://sparkjava.com/news#spark-272-released'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:39Z', 'nvd_published_at': None}
1.4.0
GHSA-mv2r-q4g5-j8q5
2022-07-07T21:37:06Z
2018-10-16T19:58:31Z
null
['CVE-2018-8269']
Denial of service in ASP.NET Core
A denial of service vulnerability exists when OData Library improperly handles web requests, aka "OData Denial of Service Vulnerability." This affects Microsoft.Data.OData.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Data.OData'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.DataProtection.AzureStorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.DataProtection.AzureStorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.7'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8269'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/385'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mv2r-q4g5-j8q5'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8269'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/46101/'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:12Z', 'nvd_published_at': None}
1.4.0
GHSA-rpch-cqj9-h65r
2021-09-17T19:23:01Z
2018-10-16T17:01:10Z
null
['CVE-2018-1000210']
High severity vulnerability that affects YamlDotNet and YamlDotNet.Signed
YamlDotNet version 4.3.2 and earlier contains a Insecure Direct Object Reference vulnerability in The default behavior of Deserializer.Deserialize() will deserialize user-controlled types in the line "currentType = Type.GetType(nodeEvent.Tag.Substring(1), throwOnError: false);" and blindly instantiates them. that can result in Code execution in the context of the running process. This attack appear to be exploitable via Victim must parse a specially-crafted YAML file. This vulnerability appears to have been fixed in 5.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'YamlDotNet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'YamlDotNet.Signed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000210'}, {'type': 'WEB', 'url': 'https://github.com/aaubry/YamlDotNet#version-500'}, {'type': 'WEB', 'url': 'https://github.com/aaubry/YamlDotNet/blob/f96b7cc40a0498f8bafdeb49df3aa23aa2c60993/YamlDotNet/Serialization/NodeTypeResolvers/TypeNameInTagNodeTypeResolver.cs#L35'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rpch-cqj9-h65r'}, {'type': 'PACKAGE', 'url': 'ps://github.com/aaubry/YamlDotNet'}]
{'cwe_ids': ['CWE-502', 'CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:19Z', 'nvd_published_at': None}
1.4.0
GHSA-ccjp-w723-2jf2
2023-09-12T15:51:03Z
2018-10-17T15:44:10Z
null
['CVE-2015-3271']
Apache Tika Server exposes sensitive information
Apache Tika provides optional functionality to run itself as a web service to allow remote use. When used in this manner, it's possible for a 3rd party to pass a 'fileUrl' header to the Apache Tika Server (tika-server) before version 1.10. This header lets a remote client request that the server fetches content from the URL provided, including files from the server's local filesystem. Depending on the file permissions set on the local filesystem, this could be used to return sensitive content from the server machine. This vulnerability only exists if you are running the tika-server version 1.9, and you allow un-trusted access to the tika-server URL. Usage of Apache Tika as a standard library is not affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3271'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ccjp-w723-2jf2'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tika'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d2b3e7afb0251fac95fdee9817423cbc91e3d99a848c25a51d91c1e8%401439485507%40%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d2b3e7afb0251fac95fdee9817423cbc91e3d99a848c25a51d91c1e8@1439485507@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/08/13/5'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95020'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:02Z', 'nvd_published_at': '2016-12-15T22:59:00Z'}
1.4.0
GHSA-qw96-mm2g-c8m7
2022-04-26T18:43:28Z
2018-10-15T21:43:12Z
null
['CVE-2018-18282']
Next.js has cross site scripting (XSS) vulnerability via the 404 or 500 /_error page
Next.js 7.0.0 and 7.0.1 has XSS via the 404 or 500 /_error page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18282'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qw96-mm2g-c8m7'}, {'type': 'PACKAGE', 'url': 'https://github.com/zeit/next.js'}, {'type': 'WEB', 'url': 'https://github.com/zeit/next.js/releases/tag/7.0.2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:04Z', 'nvd_published_at': None}
1.4.0
GHSA-g8hw-794c-4j9g
2022-06-24T19:56:11Z
2018-10-17T20:07:03Z
null
['CVE-2018-1271']
Path Traversal in org.springframework:spring-core
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1271'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2939'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g8hw-794c-4j9g'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1271'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103699'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:29Z', 'nvd_published_at': '2018-04-06T13:29:00Z'}
1.4.0
GHSA-4xr4-4c65-hj7f
2022-04-26T21:46:36Z
2018-10-17T15:44:22Z
null
['CVE-2016-4434']
Apache Tika does not properly initialize the XML parser or choose handlers
Apache Tika before 1.13 does not properly initialize the XML parser or choose handlers, which might allow remote attackers to conduct XML External Entity (XXE) attacks via vectors involving (1) spreadsheets in OOXML files and (2) XMP metadata in PDF and other file formats, a related issue to CVE-2016-2175.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4434'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4xr4-4c65-hj7f'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/tika-dev/201605.mbox/%3C1705136517.1175366.1464278135251.JavaMail.yahoo%40mail.yahoo.com%3E'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0248.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0249.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0272.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/538500/100/0/threaded'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:46Z', 'nvd_published_at': None}
1.4.0
GHSA-cr6j-3jp9-rw65
2022-10-04T21:52:32Z
2018-10-18T19:24:38Z
null
['CVE-2018-11776']
Apache Struts vulnerable to remote command execution (RCE) due to improper input validation
Apache Struts contains a Remote Code Execution when using results with no namespace and it's upper actions have no or wildcard namespace. The same flaw exists when using a url tag with no value, action set, and it's upper actions have no or wildcard namespace.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.4'}, {'fixed': '2.3.35'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.34'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5'}, {'fixed': '2.5.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.16'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11776'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-057'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cr6j-3jp9-rw65'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'https://github.com/hook-s3c/CVE-2018-11776-Python-PoC'}, {'type': 'WEB', 'url': 'https://lgtm.com/blog/apache_struts_CVE-2018-11776'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180822-0001/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181018-0002/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45260/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45262/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45367/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105125'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041547'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041888'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:43Z', 'nvd_published_at': None}
1.4.0
GHSA-4rjf-mxfm-98h5
2022-04-27T13:48:01Z
2018-10-17T17:21:29Z
null
['CVE-2016-2174']
SQL injection vulnerability in the policy admin tool in Apache Ranger
SQL injection vulnerability in the policy admin tool in Apache Ranger before 0.5.3 allows remote authenticated administrators to execute arbitrary SQL commands via the eventTime parameter to service/plugins/policies/eventTime.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2174'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4rjf-mxfm-98h5'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/06/01/3'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:02Z', 'nvd_published_at': None}
1.4.0
GHSA-mhx2-r3jx-g94c
2022-11-17T19:39:36Z
2018-10-16T23:09:15Z
null
['CVE-2015-0264']
Apache Camel allows remote actor to read arbitrary files via external entity in invalid XML string or GenericFile object
Multiple XML external entity (XXE) vulnerabilities in builder/xml/XPathBuilder.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allow remote attackers to read arbitrary files via an external entity in an invalid XML (1) String or (2) GenericFile object in an XPath query.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.14.0'}, {'fixed': '2.14.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0264'}, {'type': 'WEB', 'url': 'https://camel.apache.org/security-advisories.data/CVE-2015-0264.txt.asc'}, {'type': 'WEB', 'url': 'https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=1df559649a96a1ca0368373387e542f46e4820da'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mhx2-r3jx-g94c'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1041.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1538.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1539.html'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id/1032442'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:27Z', 'nvd_published_at': None}
1.4.0
GHSA-xm6r-4466-mr74
2022-09-13T23:39:11Z
2018-10-18T17:40:56Z
null
['CVE-2017-11467']
OrientDB vulnerable to Improper Privilage Management leading to arbitrary command injection
OrientDB through 2.2.22 does not enforce privilege requirements during "where" or "fetchplan" or "order by" use, which allows remote attackers to execute arbitrary OS commands via a crafted request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11467'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xm6r-4466-mr74'}, {'type': 'PACKAGE', 'url': 'https://github.com/orientechnologies/orientdb'}, {'type': 'WEB', 'url': 'https://github.com/orientechnologies/orientdb/wiki/OrientDB-2.2-Release-Notes#2223---july-11-2017'}, {'type': 'WEB', 'url': 'http://www.heavensec.org/?p=1703'}]
{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:45Z', 'nvd_published_at': None}
1.4.0
GHSA-p699-3wgc-7h72
2023-02-28T22:57:51Z
2018-10-17T15:43:59Z
null
['CVE-2018-1339']
org.apache.tika:tika-parsers has an Infinite Loop vulnerability
Versions of the package `org.apache.tika:tika-parsers` before version 1.18 are vulnerable to Denial of Service (DoS) via a carefully crafted (or fuzzed) file that can trigger an infinite loop via the ChmParser.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-parsers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1339'}, {'type': 'WEB', 'url': 'https://github.com/apache/tika/commit/1b6ca3685c196cfd89f5f95c19cc919ce10c5aff#diff-43f8cbe58aaab159ce88bd95fafc46dd'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tika'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4d2cb5c819401bb075e2a1130e0d14f0404a136541a6f91da0225828@%3Cdev.tika.apache.org%3E'}]
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:16Z', 'nvd_published_at': None}
1.4.0
GHSA-872g-2h8h-362q
2022-09-14T01:07:09Z
2018-10-19T16:16:16Z
null
['CVE-2016-4800']
Jetty contains an alias issue that could allow unauthenticated remote code execution due to specially crafted request
The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4800'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-872g-2h8h-362q'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190307-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00092.html'}, {'type': 'WEB', 'url': 'http://www.ocert.org/advisories/ocert-2016-001.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/90945'}, {'type': 'WEB', 'url': 'http://www.zerodayinitiative.com/advisories/ZDI-16-362'}]
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:37Z', 'nvd_published_at': None}
1.4.0
GHSA-894f-rw44-qrw5
2023-09-12T18:47:59Z
2018-10-10T17:28:21Z
null
['CVE-2017-16077']
mongose is malware
The `mongose` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mongose'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16077'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-894f-rw44-qrw5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/516'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:57Z', 'nvd_published_at': None}
1.4.0
GHSA-6j63-35hj-vmcg
2023-08-25T21:32:56Z
2018-10-30T20:34:06Z
null
['CVE-2018-18476']
mysql-bunuuid-rails vulnerable to SQL injection
mysql-binuuid-rails 1.1.0 and earlier allows SQL Injection because it removes default string escaping for affected database columns.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'mysql-binuuid-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18476'}, {'type': 'WEB', 'url': 'https://github.com/nedap/mysql-binuuid-rails/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/nedap/mysql-binuuid-rails/commit/9ae920951b46ff0163b16c55d744e89acb1036d4'}, {'type': 'WEB', 'url': 'https://gist.github.com/viraptor/881276ea61e8d56bac6e28454c79f1e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/nedap/mysql-binuuid-rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mysql-binuuid-rails/CVE-2018-18476.yml'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:25Z', 'nvd_published_at': None}