schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 14
228
| details
stringlengths 48
1.45k
| severity
stringlengths 2
78
| affected
stringlengths 79
6.96k
| references
stringlengths 143
6.38k
| database_specific
stringlengths 131
174
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-qgm9-232x-hwpx | 2021-01-29T17:10:10Z | 2018-10-18T16:48:15Z | 2021-01-29T17:10:10Z | ['CVE-2017-1000500'] | Moderate severity vulnerability that affects org.keycloak:keycloak-core | Withdrawn: Duplicate of CVE-2017-12161 / GHSA-959q-32g8-vvp7 | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000500'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qgm9-232x-hwpx'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x4cm-m36h-c6qj | 2023-02-03T20:36:51Z | 2018-10-10T17:23:33Z | null | ['CVE-2016-8647'] | Improper Input Validation in ansible | An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8647'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-modules-core/pull/5388'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1685'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2016-8647'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1396174'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8647'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x4cm-m36h-c6qj'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:04Z', 'nvd_published_at': '2018-07-26T14:29:00Z'} |
1.4.0 | GHSA-6v7w-535j-rq5m | 2023-09-26T12:49:35Z | 2018-10-17T20:29:12Z | null | ['CVE-2015-3192'] | Pivotal Spring Framework DoS Attack with XML Input | Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-web'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-web'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-web'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0.RC2'}, {'fixed': '5.0.0.RC3'}]}], 'versions': ['5.0.0.RC2']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3192'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/17727'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/20352'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/e4651d6b50c5bc85c84ff537859c212ac4e33434'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1218'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1219'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6v7w-535j-rq5m'}, {'type': 'WEB', 'url': 'https://jira.spring.io/browse/SPR-13136'}, {'type': 'WEB', 'url': 'https://jira.spring.io/browse/SPR-13136?redirect=false'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2015-3192'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162015.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162017.html'}, {'type': 'WEB', 'url': 'http://pivotal.io/security/cve-2015-3192'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1592.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1593.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2035.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2036.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/90853'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1036587'}] | {'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:17Z', 'nvd_published_at': '2016-07-12T19:59:00Z'} |
1.4.0 | GHSA-w6g3-v46q-5p28 | 2021-09-21T17:58:38Z | 2018-10-17T15:49:58Z | null | ['CVE-2018-11762'] | Moderate severity vulnerability that affects org.apache.tika:tika-core | In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9'}, {'fixed': '1.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11762'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w6g3-v46q-5p28'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105515'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h5f5-rj4r-42f6 | 2022-04-27T14:23:03Z | 2018-10-17T17:31:26Z | null | ['CVE-2018-18389'] | Incorrect access control in Neo4j Enterprise Database Server via LDAP authentication | Due to incorrect access control in Neo4j Enterprise Database Server 3.4.x before 3.4.9, the setting of LDAP for authentication with STARTTLS, and System Account for authorization, allows an attacker to log into the server by sending any valid username with an arbitrary password. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j:neo4j-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18389'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/neo4j/issues/12047'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/neo4j/commit/46de5d01ae2741ffe04c36270fc62c6d490f65c9'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h5f5-rj4r-42f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j/neo4j'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-782p-53wq-cxmj | 2021-06-11T13:55:54Z | 2018-10-16T19:51:31Z | null | ['CVE-2018-12086'] | High severity vulnerability that affects OPCFoundation.NetStandard.Opc.Ua | Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.353.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.352.12'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12086'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-782p-53wq-cxmj'}, {'type': 'WEB', 'url': 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12086.pdf'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4359'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105538'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041909'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gpvr-g6gh-9mc2 | 2021-08-02T22:35:12Z | 2018-10-23T17:22:54Z | null | ['CVE-2014-6393'] | No Charset in Content-Type Header in express | Vulnerable versions of express do not specify a charset field in the content-type header while displaying 400 level response messages. The lack of enforcing user's browser to set correct charset, could be leveraged by an attacker to perform a cross-site scripting attack, using non-standard encodings, like UTF-7.
## Recommendation
For express 3.x, update express to version 3.11 or later.
For express 4.x, update express to version 4.5 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'express'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'express'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6393'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1203190'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gpvr-g6gh-9mc2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/8'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:54Z', 'nvd_published_at': '2017-08-09T18:29:00Z'} |
1.4.0 | GHSA-mh7g-99w9-xpjm | 2022-04-27T15:06:43Z | 2018-10-17T19:56:17Z | null | ['CVE-2017-12629'] | Remote code execution occurs in Apache Solr | Remote code execution occurs in Apache Solr before versions 5.5.5, 6.6.2 and 7.1.0 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.6.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12629'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3123'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3124'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3244'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3451'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3452'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0003'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0004'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0005'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mh7g-99w9-xpjm'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/lucene'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r26c996b068ef6c5e89aa59acb769025cfd343a08e63fbe9e7f3f720f@%3Coak-issues.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/01/msg00028.html'}, {'type': 'WEB', 'url': 'https://s.apache.org/FJDl'}, {'type': 'WEB', 'url': 'https://twitter.com/ApacheSolr/status/918731485611401216'}, {'type': 'WEB', 'url': 'https://twitter.com/joshbressers/status/919258716297420802'}, {'type': 'WEB', 'url': 'https://twitter.com/searchtools_avi/status/918904813613543424'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4259-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4124'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43009/'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201710.mbox/%3CCAOOKt51UO_6Vy%3Dj8W%3Dx1pMbLW9VJfZyFWz7pAnXJC_OAdSZubA%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2017/10/13/1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101261'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:19Z', 'nvd_published_at': '2017-10-14T23:29:00Z'} |
1.4.0 | GHSA-6w3v-66mj-2qm6 | 2021-09-02T18:30:03Z | 2018-10-19T16:41:46Z | null | ['CVE-2018-1298'] | Moderate severity vulnerability that affects org.apache.qpid:apache-qpid-broker-j | A Denial of Service vulnerability was found in Apache Qpid Broker-J 7.0.0 in functionality for authentication of connections for AMQP protocols 0-8, 0-9, 0-91 and 0-10 when PLAIN or XOAUTH2 SASL mechanism is used. The vulnerability allows unauthenticated attacker to crash the broker instance. AMQP 1.0 and HTTP connections are not affected. An authentication of incoming AMQP connections in Apache Qpid Broker-J is performed by special entities called "Authentication Providers". Each Authentication Provider can support several SASL mechanisms which are offered to the connecting clients as part of SASL negotiation process. The client chooses the most appropriate SASL mechanism for authentication. Authentication Providers of following types supports PLAIN SASL mechanism: Plain, PlainPasswordFile, SimpleLDAP, Base64MD5PasswordFile, MD5, SCRAM-SHA-256, SCRAM-SHA-1. XOAUTH2 SASL mechanism is supported by Authentication Providers of type OAuth2. If an AMQP port is configured with any of these Authentication Providers, the Broker may be vulnerable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:apache-qpid-broker-j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.1'}]}], 'versions': ['7.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1298'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6w3v-66mj-2qm6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d9087e9e57c9b6376754e2b4ea8cd5e9ae6449ed17fc384640c9c9e1@%3Cusers.qpid.apache.org%3E'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8p83-68cw-943f | 2022-04-26T19:13:36Z | 2018-10-16T20:53:20Z | null | ['CVE-2017-7686'] | Apache Ignite communicates to an external PHP server where sensitive information is sent | Apache Ignite 1.0.0-RC3 to 2.0 uses an update notifier component to update the users about new project releases that include additional functionality, bug fixes and performance improvements. To do that the component communicates to an external PHP server (http://ignite.run) where it needs to send some system properties like Apache Ignite or Java version. Some of the properties might contain user sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ignite:ignite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7686'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8p83-68cw-943f'}, {'type': 'WEB', 'url': 'http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2017-7686-Apache-Ignite-Information-Disclosure-td19168.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99292'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f9cm-p3w6-xvr3 | 2020-08-31T18:08:25Z | 2018-10-09T00:38:48Z | null | ['CVE-2014-10064'] | Denial-of-Service Extended Event Loop Blocking in qs | Versions prior to 1.0.0 of `qs` are affected by a denial of service vulnerability that results from excessive recursion in parsing a deeply nested JSON string.
## Recommendation
Update to version 1.0.0 or later | [] | [{'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10064'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f9cm-p3w6-xvr3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/28'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2fw5-rvf2-jq56 | 2023-02-15T22:19:10Z | 2018-10-16T23:13:26Z | null | ['CVE-2014-0002'] | Apache Camel's XSLT component allows remote attackers to read arbitrary files | The XSLT component in Apache Camel before 2.11.4 and 2.12.x before 2.12.3 allows remote attackers to read arbitrary files and possibly have other unspecified impact via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0'}, {'fixed': '2.12.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0002'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229061309/http://www.securityfocus.com/bid/65901'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2014-0002.txt.asc'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0371.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0372.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:56Z', 'nvd_published_at': '2014-03-21T04:38:00Z'} |
1.4.0 | GHSA-6jq2-789q-fff2 | 2021-09-02T16:41:17Z | 2018-10-17T15:49:36Z | null | ['CVE-2018-11761'] | High severity vulnerability that affects org.apache.tika:tika-core | In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1'}, {'fixed': '1.19.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11761'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6jq2-789q-fff2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5553e10bba5604117967466618f219c0cae710075819c70cfb3fb421@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105514'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v6wr-fch2-vm5w | 2023-09-12T14:43:49Z | 2018-10-18T17:41:27Z | null | ['CVE-2015-2913'] | OrientDB Server Community Edition uses insufficiently random values to generate session IDs | OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the `java.util.Random` class for generation of random Session ID values in the `server/network/protocol/http/OHttpSessionManager.java`, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}], 'versions': ['2.1.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2913'}, {'type': 'WEB', 'url': 'https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v6wr-fch2-vm5w'}, {'type': 'PACKAGE', 'url': 'https://github.com/orientechnologies/orientdb'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/845332'}] | {'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rrpm-pj7p-7j9q | 2022-09-14T01:00:57Z | 2018-10-18T18:05:34Z | null | ['CVE-2018-1260'] | Spring Security OAuth vulnerable to remote code execution (RCE) | Spring Security OAuth versions prior to 2.3.3,prior to 2.2.2, prior to 2.1.2, and prior to 2.0.15 contain a remote code execution vulnerability. An attacker can craft an authorization request to the authorization endpoint that can lead to remote code execution when the resource owner is forwarded to the approval endpoint. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1260'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1809'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2939'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rrpm-pj7p-7j9q'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1260'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104158'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3x7h-5hfr-hvjm | 2021-08-31T21:36:39Z | 2018-10-19T16:54:56Z | null | ['CVE-2017-2670'] | Moderate severity vulnerability that affects io.undertow:undertow-core | It was found in Undertow before 1.3.28 that with non-clean TCP close, the Websocket server gets into infinite loop on every IO thread, effectively causing DoS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.28'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2670'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3x7h-5hfr-hvjm'}] | {'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7px3-6f6g-hxcj | 2021-09-03T21:01:44Z | 2018-10-17T19:55:34Z | null | ['CVE-2018-8026'] | Moderate severity vulnerability that affects org.apache.solr:solr-core | This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.6.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8026'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7px3-6f6g-hxcj'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-12450'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/lucene-solr-user/201807.mbox/%3C0cdc01d413b7%24f97ba580%24ec72f080%24%40apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190307-0002/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104690'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qpwj-mvv7-v3m9 | 2020-06-16T21:52:31Z | 2018-10-18T16:57:10Z | null | ['CVE-2016-4464'] | High severity vulnerability that affects org.apache.cxf.fediz:fediz-spring and org.apache.cxf.fediz:fediz-spring2 | The application plugins in Apache CXF Fediz 1.2.x before 1.2.3 and 1.3.x before 1.3.1 do not match SAML AudienceRestriction values against configured audience URIs, which might allow remote attackers to have bypass intended restrictions and have unspecified other impact via a crafted SAML token with a trusted signature. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1'}]}], 'versions': ['1.3.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1'}]}], 'versions': ['1.3.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4464'}, {'type': 'WEB', 'url': 'https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git;a=commit;h=0006581e9cacbeef46381a223e5671e524d416b6'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qpwj-mvv7-v3m9'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2016-4464.txt.asc'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/09/08/20'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/92905'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1036869'}] | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:31Z', 'nvd_published_at': '2016-09-21T18:59:00Z'} |
1.4.0 | GHSA-rhq2-2574-78mc | 2022-04-27T14:42:53Z | 2018-10-17T19:54:53Z | null | ['CVE-2018-17297'] | Unzip function in ZipUtil.java in Hutool allows remote attackers to overwrite arbitrary files via directory traversal | The unzip function in ZipUtil.java in Hutool before 4.1.12 allows remote attackers to overwrite arbitrary files via directory traversal sequences in a filename within a ZIP archive. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17297'}, {'type': 'WEB', 'url': 'https://github.com/looly/hutool/issues/162'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rhq2-2574-78mc'}, {'type': 'PACKAGE', 'url': 'https://github.com/looly/hutool'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q44v-xc3g-v7jq | 2022-11-17T19:41:38Z | 2018-10-18T17:22:11Z | null | ['CVE-2017-14735'] | OWASP AntiSamy Cross-site Scripting vulnerability | OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of : to construct a javascript: URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.antisamy:antisamy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14735'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/issues/10'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q44v-xc3g-v7jq'}, {'type': 'PACKAGE', 'url': 'https://github.com/nahsra/antisamy'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105656'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:52Z', 'nvd_published_at': '2017-09-25T21:29:00Z'} |
1.4.0 | GHSA-qw8w-2xcp-xg59 | 2023-07-04T00:07:36Z | 2018-10-10T17:29:27Z | null | ['CVE-2014-1832'] | Insecure use of temporary files in Phusion passenger | Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.37'}, {'fixed': '4.0.38'}]}], 'versions': ['4.0.37']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1832'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qw8w-2xcp-xg59'}, {'type': 'PACKAGE', 'url': 'https://github.com/phusion/passenger'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2014-1832.yml'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/29/6'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/30/3'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5q99-f34m-67gc | 2021-07-14T19:54:48Z | 2018-10-17T16:31:02Z | null | ['CVE-2018-11784'] | Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core | When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.23'}, {'fixed': '7.0.91'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11784'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0130'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0131'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0485'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1529'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5q99-f34m-67gc'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10284'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181014-0002/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3787-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4596'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105524'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:07Z', 'nvd_published_at': '2018-10-04T13:29:00Z'} |
1.4.0 | GHSA-h8w4-qv99-f7vj | 2021-01-14T21:22:21Z | 2018-10-19T22:00:28Z | null | ['CVE-2018-15758'] | High severity vulnerability that affects org.springframework.security.oauth:spring-security-oauth2 | Spring Security OAuth, versions 2.3 prior to 2.3.4, and 2.2 prior to 2.2.3, and 2.1 prior to 2.1.3, and 2.0 prior to 2.0.16, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can craft a request to the approval endpoint that can modify the previously saved authorization request and lead to a privilege escalation on the subsequent approval. This scenario can happen if the application is configured to use a custom approval endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and use a custom Approval Endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability does not expose applications that: Act in the role of an Authorization Server and use the default Approval Endpoint, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15758'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2413'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h8w4-qv99-f7vj'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-15758'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105687'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c99h-fgqm-6679 | 2022-04-27T13:52:10Z | 2018-10-17T17:22:23Z | null | ['CVE-2018-11778'] | UnixAuthenticationService in Apache Ranger was updated to correctly handle user input to avoid Stack-based buffer overflow | UnixAuthenticationService in Apache Ranger 1.2.0 was updated to correctly handle user input to avoid Stack-based buffer overflow. Versions prior to 1.2.0 should be upgraded to 1.2.0 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11778'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c99h-fgqm-6679'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04bc435a92911de4b52d2b98f169bd7cf2e8bbeb53b03788df8f932c@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd88077a781ef38f7687c100f93992f4dda8aa101925050c4af470998@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2018/q4/11'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-646x-m363-9rh4 | 2023-09-12T18:41:03Z | 2018-10-03T20:27:55Z | null | ['CVE-2017-16063'] | node-opensl is malware | The `node-opensl` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-opensl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16063'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-646x-m363-9rh4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/502'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h39x-m55c-v55h | 2022-04-26T21:49:59Z | 2018-10-17T16:20:45Z | null | ['CVE-2018-12542'] | Eclipse Vert.x does not properly neutralize '' (forward slashes) sequences that can resolve to an external location | In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the StaticHandler uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\' (forward slashes) sequences that can resolve to a location that is outside of that directory when running on Windows Operating Systems. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12542'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/issues/1025'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/commit/57a65dce6f4c5aa5e3ce7288685e7f3447eb8f3b'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539171'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h39x-m55c-v55h'}, {'type': 'PACKAGE', 'url': 'https://github.com/vert-x3/vertx-web'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p28m-34f6-967q | 2023-08-30T23:17:41Z | 2018-10-10T16:10:38Z | null | ['CVE-2018-1000807'] | PyOpenSSL Use-After-Free vulnerability | It was discovered that pyOpenSSL incorrectly handled memory when handling X509 objects. A remote attacker could use this issue to cause pyOpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. This attack appears to be exploitable via Depends on the calling application and if it retains a reference to the memory. This vulnerability appears to have been fixed in 17.5.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyopenssl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000807'}, {'type': 'WEB', 'url': 'https://github.com/pyca/pyopenssl/pull/723'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0085'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p28m-34f6-967q'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/pyopenssl'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3813-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html'}] | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:43Z', 'nvd_published_at': '2018-10-08T15:29:00Z'} |
1.4.0 | GHSA-gx96-vgf7-hwfg | 2022-04-27T14:23:39Z | 2018-10-17T18:22:29Z | null | ['CVE-2018-11797'] | In Apache PDFBox a carefully crafted PDF file can trigger an extremely long running computation | In Apache PDFBox 1.8.0 to 1.8.15 and 2.0.0RC1 to 2.0.11, a carefully crafted PDF file can trigger an extremely long running computation when parsing the page tree. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11797'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gx96-vgf7-hwfg'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/645574bc50b886d39c20b4065d51ccb1cd5d3a6b4750a22edbb565eb@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a9760973a873522f4d4c0a99916ceb74f361d91006b663a0a418d34a@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/10/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HKVPTJWZGUB4MH4AAOWMRJHRDBYFHGJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPOGHJ5CVMUVCRQU7APBAN5IVZGZFDX/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:16Z', 'nvd_published_at': '2018-10-05T20:29:00Z'} |
1.4.0 | GHSA-c7j7-p5jq-26ff | 2023-07-05T18:49:05Z | 2018-10-10T17:29:20Z | null | ['CVE-2014-1831'] | Insecure use of temporary files in passenger | Phusion Passenger before 4.0.38 allows local users to write to certain files and directories via a symlink attack on
1. `control_process.pid` or
2. a generation-* file. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.38'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1831'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/commit/34b1087870c2'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c7j7-p5jq-26ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/phusion/passenger'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2014-1831.yml'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/28/8'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/30/3'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:30Z', 'nvd_published_at': '2015-02-19T15:59:00Z'} |
1.4.0 | GHSA-p5hg-3xm3-gcjg | 2022-04-27T15:08:22Z | 2018-10-17T20:05:59Z | null | ['CVE-2018-1270'] | Spring Framework allows applications to expose STOMP over WebSocket endpoints | Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1270'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2939'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p5hg-3xm3-gcjg'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1270'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/44796/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103696'}] | {'cwe_ids': ['CWE-358', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:59Z', 'nvd_published_at': '2018-04-06T13:29:00Z'} |
1.4.0 | GHSA-c7hr-j4mj-j2w6 | 2020-08-31T18:07:57Z | 2018-10-09T00:38:30Z | null | ['CVE-2015-9235'] | Verification Bypass in jsonwebtoken | Versions 4.2.1 and earlier of `jsonwebtoken` are affected by a verification bypass vulnerability. This is a result of weak validation of the JWT algorithm type, occuring when an attacker is allowed to arbitrarily specify the JWT algorithm.
## Recommendation
Update to version 4.2.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jsonwebtoken'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9235'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687'}, {'type': 'WEB', 'url': 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c7hr-j4mj-j2w6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/17'}, {'type': 'WEB', 'url': 'https://www.timmclean.net/2015/02/25/jwt-alg-none.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-959q-32g8-vvp7 | 2020-06-16T21:27:40Z | 2018-10-18T16:50:05Z | null | ['CVE-2017-12161'] | Moderate severity vulnerability that affects org.keycloak:keycloak-core | It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12161'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak-documentation/pull/268/commits/a2b58aadee42af2c375b72e86dffc2cf23cc3770'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1484564'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-959q-32g8-vvp7'}] | {'cwe_ids': ['CWE-602'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-95m6-mjh3-58gm | 2022-09-17T00:55:51Z | 2018-10-18T16:48:41Z | null | ['CVE-2016-8609'] | Improper Authentication in org.keycloak:keycloak-core | It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8609'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-95m6-mjh3-58gm'}] | {'cwe_ids': ['CWE-287', 'CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-46j3-r4pj-4835 | 2022-04-28T19:55:03Z | 2018-10-17T16:32:43Z | null | ['CVE-2018-8034'] | The host name verification missing in Apache Tomcat | The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.32'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.53'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.35'}, {'fixed': '7.0.90'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.88'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8034'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0130'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0131'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0450'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0451'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1160'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1161'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1162'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1529'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2205'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-46j3-r4pj-4835'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180817-0001/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3723-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4281'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104895'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041374'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c8xf-m4ff-jcxj | 2021-09-08T21:44:46Z | 2018-10-17T16:23:38Z | null | ['CVE-2016-1000339'] | Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15 | In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage (testing carried out on Intel X86-64) and is now the primary AES class for the BC JCE provider from 1.56. Use of AESFastEngine is now only recommended where otherwise deemed appropriate. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000339'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c8xf-m4ff-jcxj'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3727-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-35hc-x2cw-2j4v | 2022-04-26T19:04:54Z | 2018-10-16T19:54:06Z | null | ['CVE-2018-0765'] | Denial of service vulnerability exists when .NET and .NET Core improperly process XML documents | A denial of service vulnerability exists when .NET and .NET Core improperly process XML documents, aka ".NET and .NET Core Denial of Service Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, .NET Core 2.0, Microsoft .NET Framework 4.7.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'System.Security.Cryptography.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0765'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-35hc-x2cw-2j4v'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0765'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104060'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040851'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p99p-726h-c8v5 | 2022-09-14T19:12:48Z | 2018-10-19T16:42:15Z | null | ['CVE-2018-1307'] | Apache juddi-client vulnerable to XML External Entity (XXE) | In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.juddi:juddi-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1307'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p99p-726h-c8v5'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/JUDDI-987'}, {'type': 'WEB', 'url': 'http://juddi.apache.org/security.html'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9x6q-5423-w5v9 | 2022-04-26T18:41:07Z | 2018-10-10T17:23:39Z | null | ['CVE-2013-2233'] | Ansible fails to cache SSH host keys | Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2233'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/857'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=980821'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9x6q-5423-w5v9'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2018-36.yaml'}, {'type': 'WEB', 'url': 'https://www.ansible.com/security'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/07/01/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/07/02/6'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pgf9-h69p-pcgf | 2022-10-05T14:31:16Z | 2018-10-17T20:29:33Z | null | ['CVE-2015-5211'] | Files or Directories Accessible to External Parties in org.springframework:spring-core | Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5211'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pgf9-h69p-pcgf'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-framework'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2015-5211'}, {'type': 'WEB', 'url': 'https://www.trustwave.com/Resources/SpiderLabs-Blog/Reflected-File-Download---A-New-Web-Attack-Vector/'}] | {'cwe_ids': ['CWE-20', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:06Z', 'nvd_published_at': '2017-05-25T17:29:00Z'} |
1.4.0 | GHSA-387v-84cv-9qmc | 2022-09-17T00:06:46Z | 2018-10-18T16:40:43Z | null | ['CVE-2017-3163'] | Improper Limitation of a Pathname ('Path Traversal') in org.apache.solr:solr-core | When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3163'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1447'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1448'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1449'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1450'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1451'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-387v-84cv-9qmc'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a6a33a186f293f9f9aecf3bd39c76252bfc49a79de4321dd2a53b488@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4124'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6x9x-8qw9-9pp6 | 2022-09-14T01:09:24Z | 2018-10-19T16:16:38Z | null | ['CVE-2017-7658'] | Jetty vulnerable to authorization bypass due to inconsistent HTTP request handling (HTTP Request Smuggling) | Eclipse Jetty Server versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), are vulnerable to HTTP Request Smuggling when presented with two content-lengths headers, allowing authorization bypass. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decides on the shorter length, but still passes on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary is imposing authorization, the fake pipelined request bypasses that authorization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.25.v20180606'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.24.v20180605'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.11.v20180605'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7658'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6x9x-8qw9-9pp6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181014-0001/'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4278'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106566'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041194'}] | {'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:39Z', 'nvd_published_at': '2018-06-26T17:29:00Z'} |
1.4.0 | GHSA-jwcc-j78w-j73w | 2023-08-31T21:33:55Z | 2018-10-10T17:23:20Z | null | ['CVE-2018-10855'] | Ansible exposes sensitive data in log files and on the terminal | Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10855'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2018:3788'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1948'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1949'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2022'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2079'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2184'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2585'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0054'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10855'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jwcc-j78w-j73w'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4072-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4396'}] | {'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:13Z', 'nvd_published_at': '2018-07-03T01:29:00Z'} |
1.4.0 | GHSA-jg4f-jqm5-4mgq | 2022-04-26T18:42:21Z | 2018-10-10T17:23:14Z | null | ['CVE-2016-8628'] | Ansible fails to properly sanitize fact variables sent from the Ansible controller | Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['ansible.plugins.PluginLoader.all']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8628'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/41903'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/35938b907dfcd1106ca40b794f0db446bdb8cf09'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:2778'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8628'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jg4f-jqm5-4mgq'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/94109'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p8ww-vv84-c2rm | 2022-09-13T23:50:45Z | 2018-10-18T17:41:13Z | null | ['CVE-2015-2912'] | OrientDB-Server vulnerable to Cross-Site Request Forgery | The JSONP endpoint in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 does not properly restrict callback values, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted HTTP request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}], 'versions': ['2.1.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2912'}, {'type': 'WEB', 'url': 'https://github.com/orientechnologies/orientdb/issues/4824'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p8ww-vv84-c2rm'}, {'type': 'PACKAGE', 'url': 'https://github.com/orientechnologies/orientdb'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/845332'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r4x3-g983-9g48 | 2021-12-03T14:21:10Z | 2018-10-10T17:29:34Z | 2020-06-17T16:30:54Z | [] | Moderate severity vulnerability that affects sprockets | Withdrawn, accidental duplicate publish.
Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0'}, {'fixed': '2.12.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7819'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r4x3-g983-9g48'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h3wv-47xm-4mg6 | 2022-09-14T19:16:41Z | 2018-10-19T16:51:25Z | null | ['CVE-2017-5617'] | Server Side Request Forgery in svgSalamander | The SVG Salamander (aka svgSalamander) library, when used in a web application, allows remote attackers to conduct server-side request forgery (SSRF) attacks via an xlink:href attribute in an SVG file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.kitfox.svg:svg-salamander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5617'}, {'type': 'WEB', 'url': 'https://github.com/blackears/svgSalamander/issues/11'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h3wv-47xm-4mg6'}, {'type': 'PACKAGE', 'url': 'https://github.com/blackears/svgSalamander'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3V7RIIO3HO4RNDBN2PARLIDAL3RPV2OX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPUOI6NCEB6H6YHKN7M4V3CAQD63NXAU/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-11'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3781'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/27/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/29/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95871'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5hg3-6c2f-f3wr | 2023-09-05T18:41:49Z | 2018-10-04T21:58:46Z | null | ['CVE-2018-14574'] | Django open redirect | `django.middleware.common.CommonMiddleware` in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14574'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0265'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5hg3-6c2f-f3wr'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3726-1/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20190901075632/http://www.securitytracker.com/id/1041403'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227115315/http://www.securityfocus.com/bid/104970'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4264'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2018/aug/01/security-releases/'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4c32-xmgj-2g98 | 2021-09-01T14:11:59Z | 2018-10-17T18:22:15Z | null | ['CVE-2016-2175'] | High severity vulnerability that affects org.apache.pdfbox:pdfbox | Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize the XML parsers, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted PDF. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2175'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4c32-xmgj-2g98'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54@%3Ccommits.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8@apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0179.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0248.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0249.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0272.html'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1739564'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1739565'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3606'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/538503/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/90902'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qfh2-6f7q-gr86 | 2023-03-01T01:24:43Z | 2018-10-01T16:30:38Z | null | ['CVE-2018-3755'] | Cross-Site Scripting in sexstatic | All versions of `sexstatic` are vulnerable to stored cross-site scripting (xss). This is exploitable if an attacker can control a filename that is served by `sexstatic`.
## Recommendation
As there is no fix is currently available for this vulnerability it is our recommendation to not install or used this module at this time. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'sexstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3755'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/328210'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qfh2-6f7q-gr86'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/671'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:42Z', 'nvd_published_at': '2018-06-01T17:29:00Z'} |
1.4.0 | GHSA-jx6h-3fjx-cgv5 | 2021-09-14T19:53:26Z | 2018-10-17T16:31:48Z | null | ['CVE-2018-1305'] | Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core | Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.5.27'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.85'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.84'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1305'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0465'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0466'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2939'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2205'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jx6h-3fjx-cgv5'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180706-0001/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3665-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4281'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103144'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040428'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cfh5-3ghh-wfjx | 2020-06-16T21:31:17Z | 2018-10-17T00:05:06Z | null | ['CVE-2014-3577'] | Moderate severity vulnerability that affects org.apache.httpcomponents:httpclient | org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3577'}, {'type': 'WEB', 'url': 'https://access.redhat.com/solutions/1165533'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/95327'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cfh5-3ghh-wfjx'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05363782'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/127913/Apache-HttpComponents-Man-In-The-Middle.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1146.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1166.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1833.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1834.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1835.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1836.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1891.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1892.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0125.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0158.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0675.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0720.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0765.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0850.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0851.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1176.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1177.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1888.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1773.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1931.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Aug/48'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/60466'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/60589'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/60713'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10/06/1'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.osvdb.org/110143'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/69258'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1030812'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2769-1'}] | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:17Z', 'nvd_published_at': '2014-08-21T14:55:00Z'} |
1.4.0 | GHSA-9gp7-jvm2-r4mx | 2021-09-07T21:35:59Z | 2018-10-16T19:36:43Z | null | ['CVE-2017-7672'] | Moderate severity vulnerability that affects org.apache.struts:struts2-core | If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7672'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9gp7-jvm2-r4mx'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d@%3Cannouncements.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180706-0002/'}, {'type': 'WEB', 'url': 'http://struts.apache.org/docs/s2-047.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99563'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039114'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2m8h-fgr8-2q9w | 2022-04-26T18:36:45Z | 2018-10-04T20:29:55Z | null | ['CVE-2016-9878'] | Pivotal Spring Framework Paths provided to the ResourceServlet were not properly sanitized | An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-webmvc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.18'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-webmvc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-webmvc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9878'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/19513'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/43bf008fbcd0d7945e2fcd5e30039bc4d74c7a98'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/a7dc48534ea501525f11369d369178a60c2f47d0'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/e2d6e709c3c65a4951eb096843ee75d5200cfcad'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3115'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2m8h-fgr8-2q9w'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2016-9878'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180419-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95072'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040698'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:31Z', 'nvd_published_at': '2016-12-29T09:59:00Z'} |
1.4.0 | GHSA-vvjc-q5vr-52q6 | 2022-04-26T19:23:57Z | 2018-10-16T23:13:00Z | null | ['CVE-2016-8749'] | Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks | Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-jackson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-jackson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.17.0'}, {'fixed': '2.17.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-jackson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.18.0'}, {'fixed': '2.18.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8749'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vvjc-q5vr-52q6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/05/22/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97179'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j84c-j8qm-g47r | 2022-04-27T13:41:39Z | 2018-10-17T17:21:11Z | null | ['CVE-2016-0733'] | The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password | The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password, which allows remote attackers to bypass authentication by leveraging knowledge of a valid username. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0733'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j84c-j8qm-g47r'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/RANGER-835'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ranger-dev/201602.mbox/%3CD2D9A4C5.114ECA%25vel@apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/82871'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ch6p-4jcm-h8vh | 2020-06-16T21:31:44Z | 2018-10-16T19:58:52Z | null | ['CVE-2017-0248'] | Moderate severity vulnerability that affects Microsoft.AspNetCore.Mvc and Microsoft.AspNetCore.Mvc.Core | Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability." | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.1'}, {'fixed': '4.1.2'}]}], 'versions': ['4.1.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.1'}, {'fixed': '4.3.2'}]}], 'versions': ['4.3.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0248'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ch6p-4jcm-h8vh'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98117'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1038458'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8vfm-4388-6rpc | 2022-11-17T18:47:38Z | 2018-10-16T23:06:25Z | null | ['CVE-2018-8027'] | Apache is vulnerable to XXE in XSD validation processor | Apache Camel 2.20.0 to 2.20.3 and 2.21.0 Core is vulnerable to XXE in XSD validation processor. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20.0'}, {'fixed': '2.20.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.21.0'}, {'fixed': '2.21.1'}]}], 'versions': ['2.21.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8027'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8vfm-4388-6rpc'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-10894'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-12444'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/77f596fc63e63c2e9adcff3c34759b32c225cf0b582aedb755adaade@%3Cdev.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2018-8027.txt.asc'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104933'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j8f4-2w4p-mhjc | 2021-07-01T21:44:55Z | 2018-10-16T19:57:48Z | null | ['CVE-2017-0256'] | Moderate severity vulnerability that affects Microsoft.AspNetCore.Mvc | A spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.1'}, {'fixed': '4.1.2'}]}], 'versions': ['4.1.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.1'}, {'fixed': '4.3.2'}]}], 'versions': ['4.3.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0256'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/239'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j8f4-2w4p-mhjc'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:43Z', 'nvd_published_at': '2017-05-12T14:29:00Z'} |
1.4.0 | GHSA-38cr-2ph5-frr9 | 2022-04-26T18:59:06Z | 2018-10-16T19:35:26Z | null | ['CVE-2018-1327'] | Apache Struts REST Plugin can potentially allow a DoS attack | The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-rest-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1327'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-056'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38cr-2ph5-frr9'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3@%3Cissues.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db@%3Cissues.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180330-0001/'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103516'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040575'}] | {'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pjfr-qf3p-3q25 | 2022-04-27T13:37:13Z | 2018-10-17T16:30:31Z | null | ['CVE-2017-12615'] | When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server | When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.79'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12615'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3080'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3081'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3113'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3114'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0465'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0466'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pjfr-qf3p-3q25'}, {'type': 'WEB', 'url': 'https://github.com/breaktoprotect/CVE-2017-12615'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20171018-0001/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/42953/'}, {'type': 'WEB', 'url': 'https://www.synology.com/support/security/Synology_SA_17_54_Tomcat'}, {'type': 'WEB', 'url': 'http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/100901'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039392'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gx5g-xcxj-cx2w | 2023-08-28T13:40:50Z | 2018-10-08T23:18:13Z | null | ['CVE-2018-14643'] | smart_proxy_dynflow gem authentication bypass in Foreman remote execution feature | An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'smart_proxy_dynflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.1'}]}], 'versions': ['0.2.0']}, {'package': {'ecosystem': 'RubyGems', 'name': 'smart_proxy_dynflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14643'}, {'type': 'WEB', 'url': 'https://github.com/theforeman/smart_proxy_dynflow/pull/54'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2733'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2018-14643'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1629063'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14643'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/smart_proxy_dynflow/CVE-2018-14643.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/theforeman/smart_proxy_dynflow'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:13Z', 'nvd_published_at': '2018-09-21T13:29:00Z'} |
1.4.0 | GHSA-3hrc-f439-727g | 2022-11-17T18:38:58Z | 2018-10-16T23:08:43Z | null | ['CVE-2015-0263'] | Apache Camel XML External Entity vulnerability | XML external entity (XXE) vulnerability in the XML converter setup in converter/jaxp/XmlConverter.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allows remote attackers to read arbitrary files via an external entity in an SAXSource. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.14.0'}, {'fixed': '2.14.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0263'}, {'type': 'WEB', 'url': 'https://camel.apache.org/security-advisories.data/CVE-2015-0263.txt.asc'}, {'type': 'WEB', 'url': 'https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=7d19340bcdb42f7aae584d9c5003ac4f7ddaee36'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3hrc-f439-727g'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1041.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1538.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1539.html'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1032442'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rc9v-h28f-jcmf | 2022-04-27T14:45:18Z | 2018-10-17T19:56:04Z | null | ['CVE-2018-8010'] | There is a XML external entity expansion (XXE) vulnerability in Apache Solr config files | This vulnerability in Apache Solr 6.0.0 to 6.6.3, 7.0.0 to 7.3.0 relates to an XML external entity expansion (XXE) in Solr config files (solrconfig.xml, schema.xml, managed-schema). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. Users are advised to upgrade to either Solr 6.6.4 or Solr 7.3.1 releases both of which address the vulnerability. Once upgrade is complete, no other steps are required. Those releases only allow external entities and Xincludes that refer to local files / zookeeper resources below the Solr instance directory (using Solr's ResourceLoader); usage of absolute URLs is denied. Keep in mind, that external entities and XInclude are explicitly supported to better structure config files in large installations. Before Solr 6 this was no problem, as config files were not accessible through the APIs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.6.0'}, {'fixed': '6.6.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8010'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rc9v-h28f-jcmf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/www-announce/201805.mbox/%3C08a801d3f0f9%24df46d300%249dd47900%24%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104239'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-45vg-2v73-vm62 | 2020-06-16T20:57:30Z | 2018-10-17T20:28:20Z | null | ['CVE-2015-0201'] | Moderate severity vulnerability that affects org.springframework:spring-core | The Java SockJS client in Pivotal Spring Framework 4.1.x before 4.1.5 generates predictable session ids, which allows remote attackers to send messages to other sessions via unspecified vectors. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0201'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-45vg-2v73-vm62'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2015-0201'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:30Z', 'nvd_published_at': '2015-03-10T14:59:00Z'} |
1.4.0 | GHSA-x2rg-fmcv-crq5 | 2022-04-26T18:58:37Z | 2018-10-16T19:34:22Z | null | ['CVE-2017-9822'] | DNN (aka DotNetNuke) has Remote Code Execution via a cookie | DNN (aka DotNetNuke) before 9.1.1 has Remote Code Execution via a cookie, aka "2017-08 (Critical) Possible remote code execution on DNN sites." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9822'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x2rg-fmcv-crq5'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://www.dnnsoftware.com/community/security/security-center'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102213'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g4gg-9f62-jfph | 2023-09-29T11:39:57Z | 2018-10-18T17:41:40Z | null | ['CVE-2015-2918'] | OrientDB Studio web management interface is vulnerable to clickjacking attacks | The Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 does not properly restrict use of FRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-studio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-studio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}], 'versions': ['2.1.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2918'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g4gg-9f62-jfph'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/845332'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j77q-2qqg-6989 | 2022-09-14T01:02:56Z | 2018-10-18T19:24:26Z | null | ['CVE-2017-5638'] | Apache Struts vulnerable to remote arbitrary command execution due to improper input validation | Apache Struts versions prior to 2.3.32 and 2.5.10.1 contain incorrect exception handling and error-message generation during file-upload attempts using the Jakarta Multipart parser, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.31'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.10.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5638'}, {'type': 'WEB', 'url': 'https://github.com/rapid7/metasploit-framework/issues/8064'}, {'type': 'WEB', 'url': 'https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-045'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-046'}, {'type': 'WEB', 'url': 'https://exploit-db.com/exploits/41570'}, {'type': 'WEB', 'url': 'https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=352306493971e7d5a756d61780d57a76eb1f519a'}, {'type': 'WEB', 'url': 'https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=6b8272ce47160036ed120a48345d9aa884477228'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j77q-2qqg-6989'}, {'type': 'WEB', 'url': 'https://github.com/mazen160/struts-pwn'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03733en_us'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03749en_us'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03723en_us'}, {'type': 'WEB', 'url': 'https://isc.sans.edu/diary/22169'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20170310-0001/'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-045.html'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-046.html'}, {'type': 'WEB', 'url': 'https://support.lenovo.com/us/en/product_security/len-14200'}, {'type': 'WEB', 'url': 'https://twitter.com/theog150/status/841146956135124993'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/41614/'}, {'type': 'WEB', 'url': 'https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/834067'}, {'type': 'WEB', 'url': 'https://www.symantec.com/security-center/network-protection-security-advisories/SA145'}, {'type': 'WEB', 'url': 'http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html'}, {'type': 'WEB', 'url': 'http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/'}, {'type': 'WEB', 'url': 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt'}, {'type': 'WEB', 'url': 'http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96729'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1037973'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:23Z', 'nvd_published_at': '2017-03-11T02:59:00Z'} |
1.4.0 | GHSA-cggj-fvv3-cqwv | 2022-04-26T18:57:07Z | 2018-10-16T17:45:18Z | null | ['CVE-2018-7489'] | FasterXML jackson-databind allows unauthenticated remote code execution | FasterXML jackson-databind before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.11.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7489'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/1931'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1447'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1448'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1449'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1450'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1451'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1786'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2088'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2089'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2090'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2939'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cggj-fvv3-cqwv'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180328-0001/'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4190'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103203'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040693'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041890'}] | {'cwe_ids': ['CWE-184', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:30Z', 'nvd_published_at': '2018-02-26T15:29:00Z'} |
1.4.0 | GHSA-gfx6-ph4q-q54q | 2022-09-14T19:20:48Z | 2018-10-22T20:53:02Z | null | ['CVE-2017-1000118'] | Improper Restriction of Operations within the Bounds of a Memory Buffer in akka-http-core | Akka HTTP versions <= 10.0.5 Illegal Media Range in Accept Header Causes StackOverflowError Leading to Denial of Service | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.akka:akka-http-core_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.akka:akka-http-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000118'}, {'type': 'WEB', 'url': 'https://doc.akka.io/docs/akka-http/10.0.6/security/2017-05-03-illegal-media-range-in-accept-header-causes-stackoverflowerror.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gfx6-ph4q-q54q'}] | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f5cf-f7px-xpmh | 2021-09-09T21:40:11Z | 2018-10-16T19:50:27Z | null | ['CVE-2016-2166'] | Moderate severity vulnerability that affects org.apache.qpid:proton-j | The (1) proton.reactor.Connector, (2) proton.reactor.Container, and (3) proton.utils.BlockingConnection classes in Apache Qpid Proton before 0.12.1 improperly use an unencrypted connection for an amqps URI scheme when SSL support is unavailable, which might allow man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:proton-j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2166'}, {'type': 'WEB', 'url': 'https://git-wip-us.apache.org/repos/asf?p=qpid-proton.git;h=a058585'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f5cf-f7px-xpmh'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/PROTON-1157'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d@%3Ccommits.qpid.apache.org%3E'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182414.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html'}, {'type': 'WEB', 'url': 'http://qpid.apache.org/releases/qpid-proton-0.12.1/release-notes.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/537864/100/0/threaded'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7c2r-3jqf-c9rw | 2022-09-14T00:19:56Z | 2018-10-18T17:43:28Z | null | ['CVE-2016-7051'] | jackson-dataformat-xml vulnerable to server side request forgery (SSRF) | Versions of jackson-dataformat-xml) prior to 2.7.8 and prior to 2.8.4 allow remote attackers to conduct server-side request forgery (SSRF) attacks via vectors related to a DTD. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.dataformat:jackson-dataformat-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.dataformat:jackson-dataformat-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7051'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformat-xml/issues/211'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1378673'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-dataformat-xml'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7c2r-3jqf-c9rw'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97688'}] | {'cwe_ids': ['CWE-611', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m9w8-v359-9ffr | 2022-11-17T19:38:02Z | 2018-10-19T16:42:27Z | null | ['CVE-2018-11775'] | Improper Certificate Validation in Apache activemq-client | TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.15.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11775'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m9w8-v359-9ffr'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/activemq'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105335'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041618'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:46Z', 'nvd_published_at': '2018-09-10T20:29:00Z'} |
1.4.0 | GHSA-269m-695x-j34p | 2023-08-28T10:49:23Z | 2018-10-19T16:41:04Z | null | ['CVE-2017-15702'] | Apache Qpid Broker vulnerable to authentication port spoofing | Apache Qpid Broker-J versions 0.18 through 0.32 are vulnerable to authentication port spoofing. When the broker is configured with different authentication providers on different ports, one of which is an HTTP port, then the broker can be tricked by a remote unauthenticated attacker connecting to the HTTP port into using an authentication provider that was configured on a different port. The attacker still needs valid credentials with the authentication provider on the spoofed port. This becomes an issue when the spoofed port has weaker authentication protection (e.g., anonymous access, default accounts) and is normally protected by firewall rules or similar which can be circumvented by this vulnerability. AMQP ports are not affected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-broker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18'}, {'fixed': '6.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.32'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15702'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-269m-695x-j34p'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/qpid-broker-j'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/QPID-8039'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/59d241e30db23b8b0af26bb273f789aa1f08515d3dc1a3868d3ba090@%3Cdev.qpid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://qpid.apache.org/cves/CVE-2017-15702.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102040'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cf3c-fffp-34qh | 2023-09-05T15:09:02Z | 2018-10-29T19:05:38Z | null | ['CVE-2018-14572'] | conference-scheduler-cli Arbitrary Code Execution | In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'conference-scheduler-cli'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14572'}, {'type': 'WEB', 'url': 'https://github.com/PyconUK/ConferenceScheduler-cli/issues/19'}, {'type': 'PACKAGE', 'url': 'https://github.com/PyconUK/ConferenceScheduler-cli'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cf3c-fffp-34qh'}, {'type': 'WEB', 'url': 'https://joel-malwarebenchmark.github.io/blog/2020/04/25/cve-2018-14572-conference-scheduler-cli/'}] | {'cwe_ids': ['CWE-502', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j68r-23hj-xf9c | 2023-09-07T20:36:05Z | 2018-10-10T17:28:14Z | null | ['CVE-2017-16064'] | node-openssl is malware | The `node-openssl` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-openssl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16064'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j68r-23hj-xf9c'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/503'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rcpf-vj53-7h2m | 2022-06-24T19:58:42Z | 2018-10-17T20:02:20Z | null | ['CVE-2018-1257'] | Denial of Service in org.springframework:spring-core | Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1257'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1809'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rcpf-vj53-7h2m'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1257'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104260'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:25Z', 'nvd_published_at': '2018-05-11T20:29:00Z'} |
1.4.0 | GHSA-2x83-r56g-cv47 | 2020-06-16T20:53:18Z | 2018-10-17T00:05:15Z | null | ['CVE-2012-6153'] | High severity vulnerability that affects org.apache.httpcomponents:httpclient | http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6153'}, {'type': 'WEB', 'url': 'https://access.redhat.com/solutions/1165533'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1129916'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2x83-r56g-cv47'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1098.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1833.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1834.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1835.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1836.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1891.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1892.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0125.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0158.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0675.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0720.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0765.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0850.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0851.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1888.html'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1411705'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/69257'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2769-1'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8336-mxp6-v5h9 | 2021-06-11T15:34:21Z | 2018-10-16T19:51:18Z | null | ['CVE-2018-12087'] | Moderate severity vulnerability that affects OPCFoundation.NetStandard.Opc.Ua | Failure to validate certificates in OPC Foundation UA Client Applications communicating without security allows attackers with control over a piece of network infrastructure to decrypt passwords. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.353.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.352.12'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12087'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8336-mxp6-v5h9'}, {'type': 'WEB', 'url': 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12087.pdf'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h8q5-g2cj-qr5h | 2022-04-26T21:46:04Z | 2018-10-17T15:43:25Z | null | ['CVE-2018-11796'] | Apache Tika is vulnerable to entity expansions which can lead to a denial of service attack | In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1'}, {'fixed': '1.19.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11796'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h8q5-g2cj-qr5h'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tika'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190903-0002/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105585'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fv7x-4hpc-hf9f | 2020-06-16T21:35:15Z | 2018-10-18T16:57:21Z | null | ['CVE-2017-12631'] | Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-spring, org.apache.cxf.fediz:fediz-spring2, and org.apache.cxf.fediz:fediz-spring3 | Apache CXF Fediz ships with a number of container-specific plugins to enable WS-Federation for applications. A CSRF (Cross Style Request Forgery) style vulnerability has been found in the Spring 2, Spring 3 and Spring 4 plugins in versions before 1.4.3 and 1.3.3. The vulnerability can result in a security context that is set up using a malicious client's roles for the given enduser. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12631'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fv7x-4hpc-hf9f'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://cxf.547215.n5.nabble.com/Apache-CXF-Fediz-1-4-3-and-1-3-3-released-with-a-new-security-advisory-CVE-2017-12631-td5785868.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102127'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040487'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:15Z', 'nvd_published_at': '2017-11-30T14:29:00Z'} |
1.4.0 | GHSA-w3gh-g32m-cvhr | 2020-06-16T21:59:21Z | 2018-10-18T16:56:47Z | null | ['CVE-2018-8038'] | High severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fediz:fediz-jetty9, org.apache.cxf.fediz:fediz-spring, org.apache.cxf.fediz:fediz-spring2, and org.apache.cxf.fediz:fediz-spring3 | Versions of Apache CXF Fediz prior to 1.4.4 do not fully disable Document Type Declarations (DTDs) when either parsing the Identity Provider response in the application plugins, or in the Identity Provider itself when parsing certain XML-based parameters. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-jetty8'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-jetty9'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8038'}, {'type': 'WEB', 'url': 'https://github.com/apache/cxf-fediz/commit/b6ed9865d0614332fa419fe4b6d0fe81bc2e660d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w3gh-g32m-cvhr'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f0a6a05ec3b3a00458da43712b0ff3a2f573175d9bfb39fb0de21424@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2018-8038.txt.asc'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041220'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:21Z', 'nvd_published_at': '2018-07-05T13:29:00Z'} |
1.4.0 | GHSA-jc8g-xhw5-6x46 | 2022-07-07T21:42:15Z | 2018-10-16T19:59:05Z | null | ['CVE-2018-0786'] | Improper Certificate Validation in Microsoft .NET Framework components | Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.UniversalWindowsPlatform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.UniversalWindowsPlatform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.UniversalWindowsPlatform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.UniversalWindowsPlatform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.6'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Primitives'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}], 'versions': ['4.4.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Primitives'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Primitives'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}], 'versions': ['4.4.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.NetTcp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}], 'versions': ['4.4.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.NetTcp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.NetTcp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Duplex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}], 'versions': ['4.4.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Duplex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Duplex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.1'}, {'fixed': '4.0.2'}]}], 'versions': ['4.0.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}], 'versions': ['4.4.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.1'}, {'fixed': '4.0.2'}]}], 'versions': ['4.0.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Private.ServiceModel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}], 'versions': ['4.4.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Private.ServiceModel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Private.ServiceModel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0786'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/51'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jc8g-xhw5-6x46'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0786'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/System.ServiceModel.Duplex#versions-body-tab'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:03Z', 'nvd_published_at': '2018-01-10T01:29:00Z'} |
1.4.0 | GHSA-2mp8-qvqm-3xwq | 2023-09-26T11:23:36Z | 2018-10-17T00:04:31Z | null | ['CVE-2017-14868'] | Restlet Framework Ja-rs extension is vulnerable to XXE when using SimpleXMLProvider | Restlet Framework before 2.3.11, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an XXE attack in a REST API HTTP request. This affects use of the Jax-rs extension. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.restlet.jse:org.restlet.ext.jaxrs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14868'}, {'type': 'WEB', 'url': 'https://github.com/restlet/restlet-framework-java/issues/1286'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2mp8-qvqm-3xwq'}, {'type': 'PACKAGE', 'url': 'https://github.com/restlet/restlet-framework-java'}, {'type': 'WEB', 'url': 'https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements'}, {'type': 'WEB', 'url': 'https://lgtm.com/blog/restlet_CVE-2017-14868'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j8g6-2wh7-6439 | 2022-04-26T21:47:39Z | 2018-10-17T15:44:36Z | null | ['CVE-2016-6809'] | Apache Tika allows Java code execution for serialized objects embedded in MATLAB files | Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6809'}, {'type': 'WEB', 'url': 'https://dist.apache.org/repos/dist/release/tika/CHANGES-1.14.txt'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j8g6-2wh7-6439'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/91eb639ef619b9a26b40020ca6732e7dbe457f7322ed5f1df49e411a@%3Cdev.nutch.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d2375da29d89e679abf5d845db76d6f798fdc6f7d44f2c788e8a0fb9@%3Cuser.nutch.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e414754a6c57ce7194b731e211cd6b2cbb41f2c7000e3fb9c6b6ec78@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f6f6c130b12b7332f323f74d031072b1517065ce28a22346791ffb6@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd3646bb724b66b1a9ddef69e692da2b7a727a8799551c78eedf0a0f@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'http://seclists.org/bugtraq/2016/Nov/40'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/94247'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w4g2-9hj6-5472 | 2021-09-20T22:35:57Z | 2018-10-18T18:06:08Z | null | ['CVE-2018-11087'] | Moderate severity vulnerability that affects com.rabbitmq:amqp-client and org.springframework.amqp:spring-amqp | Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp:spring-amqp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp:spring-amqp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.rabbitmq:amqp-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.rabbitmq:amqp-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11087'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w4g2-9hj6-5472'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-11087'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c77r-6f64-478q | 2023-09-07T20:32:14Z | 2018-10-18T16:49:40Z | null | ['CVE-2017-2582'] | keycloak-core discloses system properties | It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2582'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c77r-6f64-478q'}] | {'cwe_ids': ['CWE-200', 'CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9gp4-qrff-c648 | 2021-09-07T21:35:29Z | 2018-10-18T18:04:13Z | null | ['CVE-2016-1000345'] | Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15 | In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000345'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9gp4-qrff-c648'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3727-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f26x-pr96-vw86 | 2021-09-09T21:34:07Z | 2018-10-16T17:43:45Z | null | ['CVE-2018-11040'] | Moderate severity vulnerability that affects org.springframework:spring-core | Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11040'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f26x-pr96-vw86'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-11040'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}] | {'cwe_ids': ['CWE-829'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:24Z', 'nvd_published_at': '2018-06-25T15:29:00Z'} |
1.4.0 | GHSA-pgv6-jrvv-75jp | 2020-06-16T22:04:41Z | 2018-10-09T00:34:30Z | 2020-06-16T21:49:08Z | [] | Moderate severity vulnerability that affects send | Withdrawn, accidental duplicate publish.
visionmedia send before 0.8.4 for Node.js uses a partial comparison for verifying whether a directory is within the document root, which allows remote attackers to access restricted directories, as demonstrated using "public-restricted" under a "public" directory. | [] | [{'package': {'ecosystem': 'npm', 'name': 'send'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6394'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pgv6-jrvv-75jp'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cgpw-2gph-2r9g | 2021-12-03T14:28:10Z | 2018-10-16T19:59:59Z | null | [] | Moderate severity vulnerability that affects Microsoft.AspNetCore.All, Microsoft.AspNetCore.App, and Microsoft.AspNetCore.Server.Kestrel.Core | Microsoft is aware of a denial of service vulnerability in ASP.NET Core when a malformed request is terminated. An attacker who successfully exploited this vulnerability could cause a denial of service attack.
The update addresses the vulnerability by correcting how ASP.NET Core handles such requests.
| [] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/311'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cgpw-2gph-2r9g'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qh3m-qw6v-qvhg | 2020-06-16T21:51:57Z | 2018-10-17T16:20:32Z | null | ['CVE-2018-12544'] | Moderate severity vulnerability that affects io.vertx:vertx-core | In version from 3.5.Beta1 to 3.5.3 of Eclipse Vert.x, the OpenAPI XML type validator creates XML parsers without taking appropriate defense against XML attacks. This mechanism is exclusively when the developer uses the Eclipse Vert.x OpenAPI XML type validator to validate a provided schema. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12544'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/issues/1021'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2946'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539568'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qh3m-qw6v-qvhg'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j378-6mmw-hqfr | 2022-10-26T18:56:19Z | 2018-10-16T19:56:38Z | null | ['CVE-2018-8409'] | Denial of service vulnerability exists when System.IO.Pipelines improperly handles requests | A denial of service vulnerability exists when System.IO.Pipelines improperly handles requests, aka "System.IO.Pipelines Denial of Service." This affects .NET Core 2.1, System.IO.Pipelines, ASP.NET Core 2.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.3'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.3'}}, {'package': {'ecosystem': 'NuGet', 'name': 'System.IO.Pipelines'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.1'}]}], 'versions': ['4.5.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8409'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j378-6mmw-hqfr'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8409'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105223'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:41Z', 'nvd_published_at': '2018-09-13T00:29:00Z'} |
1.4.0 | GHSA-4446-656p-f54g | 2023-08-18T14:24:20Z | 2018-10-17T16:23:12Z | null | ['CVE-2018-1000613'] | Deserialization of Untrusted Data in Bouncy castle | Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs starting in version 1.57 and prior to version 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT private key can result in the execution of unexpected code. This attack appear to be exploitable via A handcrafted private key can include references to unexpected classes which will be picked up from the class path for the executing application. This vulnerability appears to have been fixed in 1.60 and later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15on'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.57'}, {'fixed': '1.60'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000613'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/cc9f91c41be67e88fca4e38f4872418448950fd9'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4446-656p-f54g'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190204-0003/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html'}] | {'cwe_ids': ['CWE-470', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:10Z', 'nvd_published_at': '2018-07-09T20:29:00Z'} |
1.4.0 | GHSA-vf4q-8mr7-5c5c | 2022-04-26T19:18:08Z | 2018-10-16T23:05:58Z | null | ['CVE-2017-12634'] | Camel-castor component in Apache Camel is vulnerable to Java object de-serialisation | The camel-castor component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-castor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.19.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-castor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20.0'}, {'fixed': '2.20.1'}]}], 'versions': ['2.20.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12634'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0319'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vf4q-8mr7-5c5c'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-11929'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2017-12634.txt.asc'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101876'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w285-wf9q-5w69 | 2022-04-27T13:36:22Z | 2018-10-17T16:27:38Z | null | ['CVE-2016-1000352'] | In Bouncy Castle JCE Provider the ECIES implementation allowed the use of ECB mode | In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000352'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w285-wf9q-5w69'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xcrm-qpp8-hcw4 | 2021-09-21T22:29:46Z | 2018-10-16T19:35:55Z | null | ['CVE-2017-15707'] | Moderate severity vulnerability that affects org.apache.struts:struts2-rest-plugin | In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-rest-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.14'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15707'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-054'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xcrm-qpp8-hcw4'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20171214-0001/'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102021'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039946'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-96jq-75wh-2658 | 2021-06-15T16:34:38Z | 2018-10-16T20:51:15Z | null | ['CVE-2018-8032'] | Moderate severity vulnerability that affects apache axis | Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.axis:axis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'axis:axis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8032'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-96jq-75wh-2658'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AXIS-2924'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00015.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060@Atlassian.JIRA%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:45Z', 'nvd_published_at': '2018-08-02T13:29:00Z'} |
1.4.0 | GHSA-9rgv-h7x4-qw8g | 2023-08-18T16:47:12Z | 2018-10-19T16:15:56Z | null | ['CVE-2018-12536'] | Eclipse Jetty Server generates error message containing sensitive information | In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn't match a dynamic url-pattern, and is eventually handled by the DefaultServlet's static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.11.v20180605'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.10.v20180503'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.3.24.v20180605'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.3.23.v20180228'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12536'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535670'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181014-0001/'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200516001904/http://www.securitytracker.com/id/1041194'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}] | {'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:36Z', 'nvd_published_at': '2018-06-27T17:29:00Z'} |
1.4.0 | GHSA-6cw8-7j6c-hccp | 2020-06-16T21:18:56Z | 2018-10-19T17:43:36Z | null | ['CVE-2018-12537'] | Moderate severity vulnerability that affects io.vertx:vertx-core | In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12537'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/vert.x/issues/2470'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2371'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536038'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1591072'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6cw8-7j6c-hccp'}, {'type': 'WEB', 'url': 'https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2018-021_vertx.txt'}] | {'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vgvf-9jh3-fg75 | 2022-09-14T19:14:19Z | 2018-10-19T16:46:30Z | null | ['CVE-2017-1000207'] | Deserialization of Untrusted Data in swagger-codegen | A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.swagger:swagger-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.swagger:swagger-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000207'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-parser/pull/481'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vgvf-9jh3-fg75'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-parser'}, {'type': 'WEB', 'url': 'https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:48Z', 'nvd_published_at': None} |