schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
14
228
details
stringlengths
48
1.45k
severity
stringlengths
2
78
affected
stringlengths
79
6.96k
references
stringlengths
143
6.38k
database_specific
stringlengths
131
174
1.4.0
GHSA-qgm9-232x-hwpx
2021-01-29T17:10:10Z
2018-10-18T16:48:15Z
2021-01-29T17:10:10Z
['CVE-2017-1000500']
Moderate severity vulnerability that affects org.keycloak:keycloak-core
Withdrawn: Duplicate of CVE-2017-12161 / GHSA-959q-32g8-vvp7
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000500'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qgm9-232x-hwpx'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:52Z', 'nvd_published_at': None}
1.4.0
GHSA-x4cm-m36h-c6qj
2023-02-03T20:36:51Z
2018-10-10T17:23:33Z
null
['CVE-2016-8647']
Improper Input Validation in ansible
An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8647'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-modules-core/pull/5388'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1685'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2016-8647'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1396174'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8647'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x4cm-m36h-c6qj'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:04Z', 'nvd_published_at': '2018-07-26T14:29:00Z'}
1.4.0
GHSA-6v7w-535j-rq5m
2023-09-26T12:49:35Z
2018-10-17T20:29:12Z
null
['CVE-2015-3192']
Pivotal Spring Framework DoS Attack with XML Input
Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-web'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-web'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-web'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0.RC2'}, {'fixed': '5.0.0.RC3'}]}], 'versions': ['5.0.0.RC2']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3192'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/17727'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/20352'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/e4651d6b50c5bc85c84ff537859c212ac4e33434'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1218'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1219'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6v7w-535j-rq5m'}, {'type': 'WEB', 'url': 'https://jira.spring.io/browse/SPR-13136'}, {'type': 'WEB', 'url': 'https://jira.spring.io/browse/SPR-13136?redirect=false'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2015-3192'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162015.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162017.html'}, {'type': 'WEB', 'url': 'http://pivotal.io/security/cve-2015-3192'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1592.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1593.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2035.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2036.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/90853'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1036587'}]
{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:17Z', 'nvd_published_at': '2016-07-12T19:59:00Z'}
1.4.0
GHSA-w6g3-v46q-5p28
2021-09-21T17:58:38Z
2018-10-17T15:49:58Z
null
['CVE-2018-11762']
Moderate severity vulnerability that affects org.apache.tika:tika-core
In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9'}, {'fixed': '1.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11762'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w6g3-v46q-5p28'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105515'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:47Z', 'nvd_published_at': None}
1.4.0
GHSA-h5f5-rj4r-42f6
2022-04-27T14:23:03Z
2018-10-17T17:31:26Z
null
['CVE-2018-18389']
Incorrect access control in Neo4j Enterprise Database Server via LDAP authentication
Due to incorrect access control in Neo4j Enterprise Database Server 3.4.x before 3.4.9, the setting of LDAP for authentication with STARTTLS, and System Account for authorization, allows an attacker to log into the server by sending any valid username with an arbitrary password.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j:neo4j-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18389'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/neo4j/issues/12047'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/neo4j/commit/46de5d01ae2741ffe04c36270fc62c6d490f65c9'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h5f5-rj4r-42f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j/neo4j'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:59Z', 'nvd_published_at': None}
1.4.0
GHSA-782p-53wq-cxmj
2021-06-11T13:55:54Z
2018-10-16T19:51:31Z
null
['CVE-2018-12086']
High severity vulnerability that affects OPCFoundation.NetStandard.Opc.Ua
Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.353.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.352.12'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12086'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-782p-53wq-cxmj'}, {'type': 'WEB', 'url': 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12086.pdf'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4359'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105538'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041909'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:05Z', 'nvd_published_at': None}
1.4.0
GHSA-gpvr-g6gh-9mc2
2021-08-02T22:35:12Z
2018-10-23T17:22:54Z
null
['CVE-2014-6393']
No Charset in Content-Type Header in express
Vulnerable versions of express do not specify a charset field in the content-type header while displaying 400 level response messages. The lack of enforcing user's browser to set correct charset, could be leveraged by an attacker to perform a cross-site scripting attack, using non-standard encodings, like UTF-7. ## Recommendation For express 3.x, update express to version 3.11 or later. For express 4.x, update express to version 4.5 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'express'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'express'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6393'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1203190'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gpvr-g6gh-9mc2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/8'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:54Z', 'nvd_published_at': '2017-08-09T18:29:00Z'}
1.4.0
GHSA-mh7g-99w9-xpjm
2022-04-27T15:06:43Z
2018-10-17T19:56:17Z
null
['CVE-2017-12629']
Remote code execution occurs in Apache Solr
Remote code execution occurs in Apache Solr before versions 5.5.5, 6.6.2 and 7.1.0 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.6.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12629'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3123'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3124'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3244'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3451'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3452'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0003'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0004'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0005'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mh7g-99w9-xpjm'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/lucene'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r26c996b068ef6c5e89aa59acb769025cfd343a08e63fbe9e7f3f720f@%3Coak-issues.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/01/msg00028.html'}, {'type': 'WEB', 'url': 'https://s.apache.org/FJDl'}, {'type': 'WEB', 'url': 'https://twitter.com/ApacheSolr/status/918731485611401216'}, {'type': 'WEB', 'url': 'https://twitter.com/joshbressers/status/919258716297420802'}, {'type': 'WEB', 'url': 'https://twitter.com/searchtools_avi/status/918904813613543424'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4259-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4124'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43009/'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201710.mbox/%3CCAOOKt51UO_6Vy%3Dj8W%3Dx1pMbLW9VJfZyFWz7pAnXJC_OAdSZubA%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2017/10/13/1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101261'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:19Z', 'nvd_published_at': '2017-10-14T23:29:00Z'}
1.4.0
GHSA-6w3v-66mj-2qm6
2021-09-02T18:30:03Z
2018-10-19T16:41:46Z
null
['CVE-2018-1298']
Moderate severity vulnerability that affects org.apache.qpid:apache-qpid-broker-j
A Denial of Service vulnerability was found in Apache Qpid Broker-J 7.0.0 in functionality for authentication of connections for AMQP protocols 0-8, 0-9, 0-91 and 0-10 when PLAIN or XOAUTH2 SASL mechanism is used. The vulnerability allows unauthenticated attacker to crash the broker instance. AMQP 1.0 and HTTP connections are not affected. An authentication of incoming AMQP connections in Apache Qpid Broker-J is performed by special entities called "Authentication Providers". Each Authentication Provider can support several SASL mechanisms which are offered to the connecting clients as part of SASL negotiation process. The client chooses the most appropriate SASL mechanism for authentication. Authentication Providers of following types supports PLAIN SASL mechanism: Plain, PlainPasswordFile, SimpleLDAP, Base64MD5PasswordFile, MD5, SCRAM-SHA-256, SCRAM-SHA-1. XOAUTH2 SASL mechanism is supported by Authentication Providers of type OAuth2. If an AMQP port is configured with any of these Authentication Providers, the Broker may be vulnerable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:apache-qpid-broker-j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.1'}]}], 'versions': ['7.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1298'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6w3v-66mj-2qm6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d9087e9e57c9b6376754e2b4ea8cd5e9ae6449ed17fc384640c9c9e1@%3Cusers.qpid.apache.org%3E'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:19Z', 'nvd_published_at': None}
1.4.0
GHSA-8p83-68cw-943f
2022-04-26T19:13:36Z
2018-10-16T20:53:20Z
null
['CVE-2017-7686']
Apache Ignite communicates to an external PHP server where sensitive information is sent
Apache Ignite 1.0.0-RC3 to 2.0 uses an update notifier component to update the users about new project releases that include additional functionality, bug fixes and performance improvements. To do that the component communicates to an external PHP server (http://ignite.run) where it needs to send some system properties like Apache Ignite or Java version. Some of the properties might contain user sensitive information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ignite:ignite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7686'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8p83-68cw-943f'}, {'type': 'WEB', 'url': 'http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2017-7686-Apache-Ignite-Information-Disclosure-td19168.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99292'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:14Z', 'nvd_published_at': None}
1.4.0
GHSA-f9cm-p3w6-xvr3
2020-08-31T18:08:25Z
2018-10-09T00:38:48Z
null
['CVE-2014-10064']
Denial-of-Service Extended Event Loop Blocking in qs
Versions prior to 1.0.0 of `qs` are affected by a denial of service vulnerability that results from excessive recursion in parsing a deeply nested JSON string. ## Recommendation Update to version 1.0.0 or later
[]
[{'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10064'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f9cm-p3w6-xvr3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/28'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:11Z', 'nvd_published_at': None}
1.4.0
GHSA-2fw5-rvf2-jq56
2023-02-15T22:19:10Z
2018-10-16T23:13:26Z
null
['CVE-2014-0002']
Apache Camel's XSLT component allows remote attackers to read arbitrary files
The XSLT component in Apache Camel before 2.11.4 and 2.12.x before 2.12.3 allows remote attackers to read arbitrary files and possibly have other unspecified impact via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0'}, {'fixed': '2.12.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0002'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229061309/http://www.securityfocus.com/bid/65901'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2014-0002.txt.asc'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0371.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0372.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:56Z', 'nvd_published_at': '2014-03-21T04:38:00Z'}
1.4.0
GHSA-6jq2-789q-fff2
2021-09-02T16:41:17Z
2018-10-17T15:49:36Z
null
['CVE-2018-11761']
High severity vulnerability that affects org.apache.tika:tika-core
In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1'}, {'fixed': '1.19.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11761'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6jq2-789q-fff2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5553e10bba5604117967466618f219c0cae710075819c70cfb3fb421@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105514'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:32Z', 'nvd_published_at': None}
1.4.0
GHSA-v6wr-fch2-vm5w
2023-09-12T14:43:49Z
2018-10-18T17:41:27Z
null
['CVE-2015-2913']
OrientDB Server Community Edition uses insufficiently random values to generate session IDs
OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the `java.util.Random` class for generation of random Session ID values in the `server/network/protocol/http/OHttpSessionManager.java`, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}], 'versions': ['2.1.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2913'}, {'type': 'WEB', 'url': 'https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v6wr-fch2-vm5w'}, {'type': 'PACKAGE', 'url': 'https://github.com/orientechnologies/orientdb'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/845332'}]
{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:02Z', 'nvd_published_at': None}
1.4.0
GHSA-rrpm-pj7p-7j9q
2022-09-14T01:00:57Z
2018-10-18T18:05:34Z
null
['CVE-2018-1260']
Spring Security OAuth vulnerable to remote code execution (RCE)
Spring Security OAuth versions prior to 2.3.3,prior to 2.2.2, prior to 2.1.2, and prior to 2.0.15 contain a remote code execution vulnerability. An attacker can craft an authorization request to the authorization endpoint that can lead to remote code execution when the resource owner is forwarded to the approval endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1260'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1809'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2939'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rrpm-pj7p-7j9q'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1260'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104158'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:47Z', 'nvd_published_at': None}
1.4.0
GHSA-3x7h-5hfr-hvjm
2021-08-31T21:36:39Z
2018-10-19T16:54:56Z
null
['CVE-2017-2670']
Moderate severity vulnerability that affects io.undertow:undertow-core
It was found in Undertow before 1.3.28 that with non-clean TCP close, the Websocket server gets into infinite loop on every IO thread, effectively causing DoS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.28'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2670'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3x7h-5hfr-hvjm'}]
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:49Z', 'nvd_published_at': None}
1.4.0
GHSA-7px3-6f6g-hxcj
2021-09-03T21:01:44Z
2018-10-17T19:55:34Z
null
['CVE-2018-8026']
Moderate severity vulnerability that affects org.apache.solr:solr-core
This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.6.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8026'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7px3-6f6g-hxcj'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-12450'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/lucene-solr-user/201807.mbox/%3C0cdc01d413b7%24f97ba580%24ec72f080%24%40apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190307-0002/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104690'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:12Z', 'nvd_published_at': None}
1.4.0
GHSA-qpwj-mvv7-v3m9
2020-06-16T21:52:31Z
2018-10-18T16:57:10Z
null
['CVE-2016-4464']
High severity vulnerability that affects org.apache.cxf.fediz:fediz-spring and org.apache.cxf.fediz:fediz-spring2
The application plugins in Apache CXF Fediz 1.2.x before 1.2.3 and 1.3.x before 1.3.1 do not match SAML AudienceRestriction values against configured audience URIs, which might allow remote attackers to have bypass intended restrictions and have unspecified other impact via a crafted SAML token with a trusted signature.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1'}]}], 'versions': ['1.3.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1'}]}], 'versions': ['1.3.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4464'}, {'type': 'WEB', 'url': 'https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git;a=commit;h=0006581e9cacbeef46381a223e5671e524d416b6'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qpwj-mvv7-v3m9'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2016-4464.txt.asc'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/09/08/20'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/92905'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1036869'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:31Z', 'nvd_published_at': '2016-09-21T18:59:00Z'}
1.4.0
GHSA-rhq2-2574-78mc
2022-04-27T14:42:53Z
2018-10-17T19:54:53Z
null
['CVE-2018-17297']
Unzip function in ZipUtil.java in Hutool allows remote attackers to overwrite arbitrary files via directory traversal
The unzip function in ZipUtil.java in Hutool before 4.1.12 allows remote attackers to overwrite arbitrary files via directory traversal sequences in a filename within a ZIP archive.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17297'}, {'type': 'WEB', 'url': 'https://github.com/looly/hutool/issues/162'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rhq2-2574-78mc'}, {'type': 'PACKAGE', 'url': 'https://github.com/looly/hutool'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:00Z', 'nvd_published_at': None}
1.4.0
GHSA-q44v-xc3g-v7jq
2022-11-17T19:41:38Z
2018-10-18T17:22:11Z
null
['CVE-2017-14735']
OWASP AntiSamy Cross-site Scripting vulnerability
OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of &colon; to construct a javascript: URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.antisamy:antisamy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14735'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/issues/10'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q44v-xc3g-v7jq'}, {'type': 'PACKAGE', 'url': 'https://github.com/nahsra/antisamy'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105656'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:52Z', 'nvd_published_at': '2017-09-25T21:29:00Z'}
1.4.0
GHSA-qw8w-2xcp-xg59
2023-07-04T00:07:36Z
2018-10-10T17:29:27Z
null
['CVE-2014-1832']
Insecure use of temporary files in Phusion passenger
Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.37'}, {'fixed': '4.0.38'}]}], 'versions': ['4.0.37']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1832'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qw8w-2xcp-xg59'}, {'type': 'PACKAGE', 'url': 'https://github.com/phusion/passenger'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2014-1832.yml'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/29/6'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/30/3'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:59Z', 'nvd_published_at': None}
1.4.0
GHSA-5q99-f34m-67gc
2021-07-14T19:54:48Z
2018-10-17T16:31:02Z
null
['CVE-2018-11784']
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.23'}, {'fixed': '7.0.91'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11784'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0130'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0131'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0485'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1529'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5q99-f34m-67gc'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10284'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181014-0002/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3787-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4596'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105524'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:07Z', 'nvd_published_at': '2018-10-04T13:29:00Z'}
1.4.0
GHSA-h8w4-qv99-f7vj
2021-01-14T21:22:21Z
2018-10-19T22:00:28Z
null
['CVE-2018-15758']
High severity vulnerability that affects org.springframework.security.oauth:spring-security-oauth2
Spring Security OAuth, versions 2.3 prior to 2.3.4, and 2.2 prior to 2.2.3, and 2.1 prior to 2.1.3, and 2.0 prior to 2.0.16, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can craft a request to the approval endpoint that can modify the previously saved authorization request and lead to a privilege escalation on the subsequent approval. This scenario can happen if the application is configured to use a custom approval endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and use a custom Approval Endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability does not expose applications that: Act in the role of an Authorization Server and use the default Approval Endpoint, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15758'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2413'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h8w4-qv99-f7vj'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-15758'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105687'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:36Z', 'nvd_published_at': None}
1.4.0
GHSA-c99h-fgqm-6679
2022-04-27T13:52:10Z
2018-10-17T17:22:23Z
null
['CVE-2018-11778']
UnixAuthenticationService in Apache Ranger was updated to correctly handle user input to avoid Stack-based buffer overflow
UnixAuthenticationService in Apache Ranger 1.2.0 was updated to correctly handle user input to avoid Stack-based buffer overflow. Versions prior to 1.2.0 should be upgraded to 1.2.0
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11778'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c99h-fgqm-6679'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04bc435a92911de4b52d2b98f169bd7cf2e8bbeb53b03788df8f932c@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd88077a781ef38f7687c100f93992f4dda8aa101925050c4af470998@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2018/q4/11'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:43Z', 'nvd_published_at': None}
1.4.0
GHSA-646x-m363-9rh4
2023-09-12T18:41:03Z
2018-10-03T20:27:55Z
null
['CVE-2017-16063']
node-opensl is malware
The `node-opensl` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-opensl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16063'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-646x-m363-9rh4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/502'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:55Z', 'nvd_published_at': None}
1.4.0
GHSA-h39x-m55c-v55h
2022-04-26T21:49:59Z
2018-10-17T16:20:45Z
null
['CVE-2018-12542']
Eclipse Vert.x does not properly neutralize '' (forward slashes) sequences that can resolve to an external location
In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the StaticHandler uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\' (forward slashes) sequences that can resolve to a location that is outside of that directory when running on Windows Operating Systems.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12542'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/issues/1025'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/commit/57a65dce6f4c5aa5e3ce7288685e7f3447eb8f3b'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539171'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h39x-m55c-v55h'}, {'type': 'PACKAGE', 'url': 'https://github.com/vert-x3/vertx-web'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:32Z', 'nvd_published_at': None}
1.4.0
GHSA-p28m-34f6-967q
2023-08-30T23:17:41Z
2018-10-10T16:10:38Z
null
['CVE-2018-1000807']
PyOpenSSL Use-After-Free vulnerability
It was discovered that pyOpenSSL incorrectly handled memory when handling X509 objects. A remote attacker could use this issue to cause pyOpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. This attack appears to be exploitable via Depends on the calling application and if it retains a reference to the memory. This vulnerability appears to have been fixed in 17.5.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyopenssl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000807'}, {'type': 'WEB', 'url': 'https://github.com/pyca/pyopenssl/pull/723'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0085'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p28m-34f6-967q'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/pyopenssl'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3813-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html'}]
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:43Z', 'nvd_published_at': '2018-10-08T15:29:00Z'}
1.4.0
GHSA-gx96-vgf7-hwfg
2022-04-27T14:23:39Z
2018-10-17T18:22:29Z
null
['CVE-2018-11797']
In Apache PDFBox a carefully crafted PDF file can trigger an extremely long running computation
In Apache PDFBox 1.8.0 to 1.8.15 and 2.0.0RC1 to 2.0.11, a carefully crafted PDF file can trigger an extremely long running computation when parsing the page tree.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11797'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gx96-vgf7-hwfg'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/645574bc50b886d39c20b4065d51ccb1cd5d3a6b4750a22edbb565eb@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a9760973a873522f4d4c0a99916ceb74f361d91006b663a0a418d34a@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/10/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HKVPTJWZGUB4MH4AAOWMRJHRDBYFHGJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPOGHJ5CVMUVCRQU7APBAN5IVZGZFDX/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:16Z', 'nvd_published_at': '2018-10-05T20:29:00Z'}
1.4.0
GHSA-c7j7-p5jq-26ff
2023-07-05T18:49:05Z
2018-10-10T17:29:20Z
null
['CVE-2014-1831']
Insecure use of temporary files in passenger
Phusion Passenger before 4.0.38 allows local users to write to certain files and directories via a symlink attack on 1. `control_process.pid` or 2. a generation-* file.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.38'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1831'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/commit/34b1087870c2'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c7j7-p5jq-26ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/phusion/passenger'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2014-1831.yml'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/28/8'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/30/3'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:30Z', 'nvd_published_at': '2015-02-19T15:59:00Z'}
1.4.0
GHSA-p5hg-3xm3-gcjg
2022-04-27T15:08:22Z
2018-10-17T20:05:59Z
null
['CVE-2018-1270']
Spring Framework allows applications to expose STOMP over WebSocket endpoints
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1270'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2939'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p5hg-3xm3-gcjg'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1270'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/44796/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103696'}]
{'cwe_ids': ['CWE-358', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:59Z', 'nvd_published_at': '2018-04-06T13:29:00Z'}
1.4.0
GHSA-c7hr-j4mj-j2w6
2020-08-31T18:07:57Z
2018-10-09T00:38:30Z
null
['CVE-2015-9235']
Verification Bypass in jsonwebtoken
Versions 4.2.1 and earlier of `jsonwebtoken` are affected by a verification bypass vulnerability. This is a result of weak validation of the JWT algorithm type, occuring when an attacker is allowed to arbitrarily specify the JWT algorithm. ## Recommendation Update to version 4.2.2 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jsonwebtoken'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9235'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687'}, {'type': 'WEB', 'url': 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c7hr-j4mj-j2w6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/17'}, {'type': 'WEB', 'url': 'https://www.timmclean.net/2015/02/25/jwt-alg-none.html'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:27Z', 'nvd_published_at': None}
1.4.0
GHSA-959q-32g8-vvp7
2020-06-16T21:27:40Z
2018-10-18T16:50:05Z
null
['CVE-2017-12161']
Moderate severity vulnerability that affects org.keycloak:keycloak-core
It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12161'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak-documentation/pull/268/commits/a2b58aadee42af2c375b72e86dffc2cf23cc3770'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1484564'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-959q-32g8-vvp7'}]
{'cwe_ids': ['CWE-602'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:40Z', 'nvd_published_at': None}
1.4.0
GHSA-95m6-mjh3-58gm
2022-09-17T00:55:51Z
2018-10-18T16:48:41Z
null
['CVE-2016-8609']
Improper Authentication in org.keycloak:keycloak-core
It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8609'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-95m6-mjh3-58gm'}]
{'cwe_ids': ['CWE-287', 'CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:42Z', 'nvd_published_at': None}
1.4.0
GHSA-46j3-r4pj-4835
2022-04-28T19:55:03Z
2018-10-17T16:32:43Z
null
['CVE-2018-8034']
The host name verification missing in Apache Tomcat
The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.32'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.53'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.35'}, {'fixed': '7.0.90'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.88'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8034'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0130'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0131'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0450'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0451'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1160'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1161'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1162'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1529'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2205'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-46j3-r4pj-4835'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180817-0001/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3723-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4281'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104895'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041374'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:40Z', 'nvd_published_at': None}
1.4.0
GHSA-c8xf-m4ff-jcxj
2021-09-08T21:44:46Z
2018-10-17T16:23:38Z
null
['CVE-2016-1000339']
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage (testing carried out on Intel X86-64) and is now the primary AES class for the BC JCE provider from 1.56. Use of AESFastEngine is now only recommended where otherwise deemed appropriate.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000339'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c8xf-m4ff-jcxj'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3727-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:37Z', 'nvd_published_at': None}
1.4.0
GHSA-35hc-x2cw-2j4v
2022-04-26T19:04:54Z
2018-10-16T19:54:06Z
null
['CVE-2018-0765']
Denial of service vulnerability exists when .NET and .NET Core improperly process XML documents
A denial of service vulnerability exists when .NET and .NET Core improperly process XML documents, aka ".NET and .NET Core Denial of Service Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, .NET Core 2.0, Microsoft .NET Framework 4.7.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'System.Security.Cryptography.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0765'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-35hc-x2cw-2j4v'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0765'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104060'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040851'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:06Z', 'nvd_published_at': None}
1.4.0
GHSA-p99p-726h-c8v5
2022-09-14T19:12:48Z
2018-10-19T16:42:15Z
null
['CVE-2018-1307']
Apache juddi-client vulnerable to XML External Entity (XXE)
In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.juddi:juddi-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1307'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p99p-726h-c8v5'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/JUDDI-987'}, {'type': 'WEB', 'url': 'http://juddi.apache.org/security.html'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:42Z', 'nvd_published_at': None}
1.4.0
GHSA-9x6q-5423-w5v9
2022-04-26T18:41:07Z
2018-10-10T17:23:39Z
null
['CVE-2013-2233']
Ansible fails to cache SSH host keys
Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2233'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/857'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=980821'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9x6q-5423-w5v9'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2018-36.yaml'}, {'type': 'WEB', 'url': 'https://www.ansible.com/security'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/07/01/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/07/02/6'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:49Z', 'nvd_published_at': None}
1.4.0
GHSA-pgf9-h69p-pcgf
2022-10-05T14:31:16Z
2018-10-17T20:29:33Z
null
['CVE-2015-5211']
Files or Directories Accessible to External Parties in org.springframework:spring-core
Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5211'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pgf9-h69p-pcgf'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-framework'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2015-5211'}, {'type': 'WEB', 'url': 'https://www.trustwave.com/Resources/SpiderLabs-Blog/Reflected-File-Download---A-New-Web-Attack-Vector/'}]
{'cwe_ids': ['CWE-20', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:06Z', 'nvd_published_at': '2017-05-25T17:29:00Z'}
1.4.0
GHSA-387v-84cv-9qmc
2022-09-17T00:06:46Z
2018-10-18T16:40:43Z
null
['CVE-2017-3163']
Improper Limitation of a Pathname ('Path Traversal') in org.apache.solr:solr-core
When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3163'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1447'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1448'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1449'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1450'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1451'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-387v-84cv-9qmc'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a6a33a186f293f9f9aecf3bd39c76252bfc49a79de4321dd2a53b488@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4124'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:26Z', 'nvd_published_at': None}
1.4.0
GHSA-6x9x-8qw9-9pp6
2022-09-14T01:09:24Z
2018-10-19T16:16:38Z
null
['CVE-2017-7658']
Jetty vulnerable to authorization bypass due to inconsistent HTTP request handling (HTTP Request Smuggling)
Eclipse Jetty Server versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), are vulnerable to HTTP Request Smuggling when presented with two content-lengths headers, allowing authorization bypass. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decides on the shorter length, but still passes on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary is imposing authorization, the fake pipelined request bypasses that authorization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.25.v20180606'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.24.v20180605'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.11.v20180605'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7658'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6x9x-8qw9-9pp6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181014-0001/'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4278'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106566'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041194'}]
{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:39Z', 'nvd_published_at': '2018-06-26T17:29:00Z'}
1.4.0
GHSA-jwcc-j78w-j73w
2023-08-31T21:33:55Z
2018-10-10T17:23:20Z
null
['CVE-2018-10855']
Ansible exposes sensitive data in log files and on the terminal
Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10855'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2018:3788'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1948'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1949'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2022'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2079'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2184'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2585'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0054'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10855'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jwcc-j78w-j73w'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4072-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4396'}]
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:13Z', 'nvd_published_at': '2018-07-03T01:29:00Z'}
1.4.0
GHSA-jg4f-jqm5-4mgq
2022-04-26T18:42:21Z
2018-10-10T17:23:14Z
null
['CVE-2016-8628']
Ansible fails to properly sanitize fact variables sent from the Ansible controller
Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['ansible.plugins.PluginLoader.all']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8628'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/41903'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/35938b907dfcd1106ca40b794f0db446bdb8cf09'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:2778'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8628'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jg4f-jqm5-4mgq'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/94109'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:18Z', 'nvd_published_at': None}
1.4.0
GHSA-p8ww-vv84-c2rm
2022-09-13T23:50:45Z
2018-10-18T17:41:13Z
null
['CVE-2015-2912']
OrientDB-Server vulnerable to Cross-Site Request Forgery
The JSONP endpoint in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 does not properly restrict callback values, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted HTTP request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}], 'versions': ['2.1.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2912'}, {'type': 'WEB', 'url': 'https://github.com/orientechnologies/orientdb/issues/4824'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p8ww-vv84-c2rm'}, {'type': 'PACKAGE', 'url': 'https://github.com/orientechnologies/orientdb'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/845332'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:37Z', 'nvd_published_at': None}
1.4.0
GHSA-r4x3-g983-9g48
2021-12-03T14:21:10Z
2018-10-10T17:29:34Z
2020-06-17T16:30:54Z
[]
Moderate severity vulnerability that affects sprockets
Withdrawn, accidental duplicate publish. Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0'}, {'fixed': '2.12.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7819'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r4x3-g983-9g48'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:54Z', 'nvd_published_at': None}
1.4.0
GHSA-h3wv-47xm-4mg6
2022-09-14T19:16:41Z
2018-10-19T16:51:25Z
null
['CVE-2017-5617']
Server Side Request Forgery in svgSalamander
The SVG Salamander (aka svgSalamander) library, when used in a web application, allows remote attackers to conduct server-side request forgery (SSRF) attacks via an xlink:href attribute in an SVG file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.kitfox.svg:svg-salamander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5617'}, {'type': 'WEB', 'url': 'https://github.com/blackears/svgSalamander/issues/11'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h3wv-47xm-4mg6'}, {'type': 'PACKAGE', 'url': 'https://github.com/blackears/svgSalamander'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3V7RIIO3HO4RNDBN2PARLIDAL3RPV2OX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPUOI6NCEB6H6YHKN7M4V3CAQD63NXAU/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-11'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3781'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/27/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/29/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95871'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:36Z', 'nvd_published_at': None}
1.4.0
GHSA-5hg3-6c2f-f3wr
2023-09-05T18:41:49Z
2018-10-04T21:58:46Z
null
['CVE-2018-14574']
Django open redirect
`django.middleware.common.CommonMiddleware` in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14574'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0265'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5hg3-6c2f-f3wr'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3726-1/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20190901075632/http://www.securitytracker.com/id/1041403'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227115315/http://www.securityfocus.com/bid/104970'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4264'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2018/aug/01/security-releases/'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:20Z', 'nvd_published_at': None}
1.4.0
GHSA-4c32-xmgj-2g98
2021-09-01T14:11:59Z
2018-10-17T18:22:15Z
null
['CVE-2016-2175']
High severity vulnerability that affects org.apache.pdfbox:pdfbox
Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize the XML parsers, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted PDF.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2175'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4c32-xmgj-2g98'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54@%3Ccommits.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8@apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0179.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0248.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0249.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0272.html'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1739564'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1739565'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3606'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/538503/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/90902'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:03Z', 'nvd_published_at': None}
1.4.0
GHSA-qfh2-6f7q-gr86
2023-03-01T01:24:43Z
2018-10-01T16:30:38Z
null
['CVE-2018-3755']
Cross-Site Scripting in sexstatic
All versions of `sexstatic` are vulnerable to stored cross-site scripting (xss). This is exploitable if an attacker can control a filename that is served by `sexstatic`. ## Recommendation As there is no fix is currently available for this vulnerability it is our recommendation to not install or used this module at this time.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sexstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3755'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/328210'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qfh2-6f7q-gr86'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/671'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:42Z', 'nvd_published_at': '2018-06-01T17:29:00Z'}
1.4.0
GHSA-jx6h-3fjx-cgv5
2021-09-14T19:53:26Z
2018-10-17T16:31:48Z
null
['CVE-2018-1305']
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.5.27'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.85'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.84'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1305'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0465'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0466'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2939'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2205'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jx6h-3fjx-cgv5'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180706-0001/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3665-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4281'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103144'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040428'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:18Z', 'nvd_published_at': None}
1.4.0
GHSA-cfh5-3ghh-wfjx
2020-06-16T21:31:17Z
2018-10-17T00:05:06Z
null
['CVE-2014-3577']
Moderate severity vulnerability that affects org.apache.httpcomponents:httpclient
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3577'}, {'type': 'WEB', 'url': 'https://access.redhat.com/solutions/1165533'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/95327'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cfh5-3ghh-wfjx'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05363782'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/127913/Apache-HttpComponents-Man-In-The-Middle.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1146.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1166.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1833.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1834.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1835.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1836.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1891.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1892.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0125.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0158.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0675.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0720.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0765.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0850.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0851.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1176.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1177.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1888.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1773.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1931.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Aug/48'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/60466'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/60589'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/60713'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10/06/1'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.osvdb.org/110143'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/69258'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1030812'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2769-1'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:17Z', 'nvd_published_at': '2014-08-21T14:55:00Z'}
1.4.0
GHSA-9gp7-jvm2-r4mx
2021-09-07T21:35:59Z
2018-10-16T19:36:43Z
null
['CVE-2017-7672']
Moderate severity vulnerability that affects org.apache.struts:struts2-core
If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7672'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9gp7-jvm2-r4mx'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d@%3Cannouncements.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180706-0002/'}, {'type': 'WEB', 'url': 'http://struts.apache.org/docs/s2-047.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99563'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039114'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:35Z', 'nvd_published_at': None}
1.4.0
GHSA-2m8h-fgr8-2q9w
2022-04-26T18:36:45Z
2018-10-04T20:29:55Z
null
['CVE-2016-9878']
Pivotal Spring Framework Paths provided to the ResourceServlet were not properly sanitized
An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-webmvc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.18'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-webmvc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-webmvc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9878'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/19513'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/43bf008fbcd0d7945e2fcd5e30039bc4d74c7a98'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/a7dc48534ea501525f11369d369178a60c2f47d0'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/e2d6e709c3c65a4951eb096843ee75d5200cfcad'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3115'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2m8h-fgr8-2q9w'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2016-9878'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180419-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95072'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040698'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:31Z', 'nvd_published_at': '2016-12-29T09:59:00Z'}
1.4.0
GHSA-vvjc-q5vr-52q6
2022-04-26T19:23:57Z
2018-10-16T23:13:00Z
null
['CVE-2016-8749']
Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks
Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-jackson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-jackson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.17.0'}, {'fixed': '2.17.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-jackson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.18.0'}, {'fixed': '2.18.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8749'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vvjc-q5vr-52q6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/05/22/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97179'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:26Z', 'nvd_published_at': None}
1.4.0
GHSA-j84c-j8qm-g47r
2022-04-27T13:41:39Z
2018-10-17T17:21:11Z
null
['CVE-2016-0733']
The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password
The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password, which allows remote attackers to bypass authentication by leveraging knowledge of a valid username.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0733'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j84c-j8qm-g47r'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/RANGER-835'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ranger-dev/201602.mbox/%3CD2D9A4C5.114ECA%25vel@apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/82871'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:33Z', 'nvd_published_at': None}
1.4.0
GHSA-ch6p-4jcm-h8vh
2020-06-16T21:31:44Z
2018-10-16T19:58:52Z
null
['CVE-2017-0248']
Moderate severity vulnerability that affects Microsoft.AspNetCore.Mvc and Microsoft.AspNetCore.Mvc.Core
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability."
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.1'}, {'fixed': '4.1.2'}]}], 'versions': ['4.1.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.1'}, {'fixed': '4.3.2'}]}], 'versions': ['4.3.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0248'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ch6p-4jcm-h8vh'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98117'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1038458'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:44Z', 'nvd_published_at': None}
1.4.0
GHSA-8vfm-4388-6rpc
2022-11-17T18:47:38Z
2018-10-16T23:06:25Z
null
['CVE-2018-8027']
Apache is vulnerable to XXE in XSD validation processor
Apache Camel 2.20.0 to 2.20.3 and 2.21.0 Core is vulnerable to XXE in XSD validation processor.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20.0'}, {'fixed': '2.20.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.21.0'}, {'fixed': '2.21.1'}]}], 'versions': ['2.21.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8027'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8vfm-4388-6rpc'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-10894'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-12444'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/77f596fc63e63c2e9adcff3c34759b32c225cf0b582aedb755adaade@%3Cdev.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2018-8027.txt.asc'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104933'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:41Z', 'nvd_published_at': None}
1.4.0
GHSA-j8f4-2w4p-mhjc
2021-07-01T21:44:55Z
2018-10-16T19:57:48Z
null
['CVE-2017-0256']
Moderate severity vulnerability that affects Microsoft.AspNetCore.Mvc
A spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.1'}, {'fixed': '4.1.2'}]}], 'versions': ['4.1.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.1'}, {'fixed': '4.3.2'}]}], 'versions': ['4.3.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http.WinHttpHandler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Net.WebSockets.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Abstractions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ApiExplorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.DataAnnotations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Formatters.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Localization'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor.Host'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.Razor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.TagHelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.ViewFeatures'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Mvc.WebApiCompatShim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0256'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/239'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j8f4-2w4p-mhjc'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:43Z', 'nvd_published_at': '2017-05-12T14:29:00Z'}
1.4.0
GHSA-38cr-2ph5-frr9
2022-04-26T18:59:06Z
2018-10-16T19:35:26Z
null
['CVE-2018-1327']
Apache Struts REST Plugin can potentially allow a DoS attack
The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-rest-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1327'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-056'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38cr-2ph5-frr9'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3@%3Cissues.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db@%3Cissues.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180330-0001/'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103516'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040575'}]
{'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:29Z', 'nvd_published_at': None}
1.4.0
GHSA-pjfr-qf3p-3q25
2022-04-27T13:37:13Z
2018-10-17T16:30:31Z
null
['CVE-2017-12615']
When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.79'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12615'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3080'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3081'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3113'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3114'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0465'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0466'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pjfr-qf3p-3q25'}, {'type': 'WEB', 'url': 'https://github.com/breaktoprotect/CVE-2017-12615'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20171018-0001/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/42953/'}, {'type': 'WEB', 'url': 'https://www.synology.com/support/security/Synology_SA_17_54_Tomcat'}, {'type': 'WEB', 'url': 'http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/100901'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039392'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:21Z', 'nvd_published_at': None}
1.4.0
GHSA-gx5g-xcxj-cx2w
2023-08-28T13:40:50Z
2018-10-08T23:18:13Z
null
['CVE-2018-14643']
smart_proxy_dynflow gem authentication bypass in Foreman remote execution feature
An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'smart_proxy_dynflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.1'}]}], 'versions': ['0.2.0']}, {'package': {'ecosystem': 'RubyGems', 'name': 'smart_proxy_dynflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14643'}, {'type': 'WEB', 'url': 'https://github.com/theforeman/smart_proxy_dynflow/pull/54'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2733'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2018-14643'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1629063'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14643'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/smart_proxy_dynflow/CVE-2018-14643.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/theforeman/smart_proxy_dynflow'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:13Z', 'nvd_published_at': '2018-09-21T13:29:00Z'}
1.4.0
GHSA-3hrc-f439-727g
2022-11-17T18:38:58Z
2018-10-16T23:08:43Z
null
['CVE-2015-0263']
Apache Camel XML External Entity vulnerability
XML external entity (XXE) vulnerability in the XML converter setup in converter/jaxp/XmlConverter.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allows remote attackers to read arbitrary files via an external entity in an SAXSource.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.14.0'}, {'fixed': '2.14.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0263'}, {'type': 'WEB', 'url': 'https://camel.apache.org/security-advisories.data/CVE-2015-0263.txt.asc'}, {'type': 'WEB', 'url': 'https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=7d19340bcdb42f7aae584d9c5003ac4f7ddaee36'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3hrc-f439-727g'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1041.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1538.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1539.html'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1032442'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:17Z', 'nvd_published_at': None}
1.4.0
GHSA-rc9v-h28f-jcmf
2022-04-27T14:45:18Z
2018-10-17T19:56:04Z
null
['CVE-2018-8010']
There is a XML external entity expansion (XXE) vulnerability in Apache Solr config files
This vulnerability in Apache Solr 6.0.0 to 6.6.3, 7.0.0 to 7.3.0 relates to an XML external entity expansion (XXE) in Solr config files (solrconfig.xml, schema.xml, managed-schema). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. Users are advised to upgrade to either Solr 6.6.4 or Solr 7.3.1 releases both of which address the vulnerability. Once upgrade is complete, no other steps are required. Those releases only allow external entities and Xincludes that refer to local files / zookeeper resources below the Solr instance directory (using Solr's ResourceLoader); usage of absolute URLs is denied. Keep in mind, that external entities and XInclude are explicitly supported to better structure config files in large installations. Before Solr 6 this was no problem, as config files were not accessible through the APIs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.6.0'}, {'fixed': '6.6.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8010'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rc9v-h28f-jcmf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/www-announce/201805.mbox/%3C08a801d3f0f9%24df46d300%249dd47900%24%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104239'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:20Z', 'nvd_published_at': None}
1.4.0
GHSA-45vg-2v73-vm62
2020-06-16T20:57:30Z
2018-10-17T20:28:20Z
null
['CVE-2015-0201']
Moderate severity vulnerability that affects org.springframework:spring-core
The Java SockJS client in Pivotal Spring Framework 4.1.x before 4.1.5 generates predictable session ids, which allows remote attackers to send messages to other sessions via unspecified vectors.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0201'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-45vg-2v73-vm62'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2015-0201'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:30Z', 'nvd_published_at': '2015-03-10T14:59:00Z'}
1.4.0
GHSA-x2rg-fmcv-crq5
2022-04-26T18:58:37Z
2018-10-16T19:34:22Z
null
['CVE-2017-9822']
DNN (aka DotNetNuke) has Remote Code Execution via a cookie
DNN (aka DotNetNuke) before 9.1.1 has Remote Code Execution via a cookie, aka "2017-08 (Critical) Possible remote code execution on DNN sites."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9822'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x2rg-fmcv-crq5'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://www.dnnsoftware.com/community/security/security-center'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102213'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:47Z', 'nvd_published_at': None}
1.4.0
GHSA-g4gg-9f62-jfph
2023-09-29T11:39:57Z
2018-10-18T17:41:40Z
null
['CVE-2015-2918']
OrientDB Studio web management interface is vulnerable to clickjacking attacks
The Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 does not properly restrict use of FRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-studio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.orientechnologies:orientdb-studio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}], 'versions': ['2.1.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2918'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g4gg-9f62-jfph'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/845332'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:04Z', 'nvd_published_at': None}
1.4.0
GHSA-j77q-2qqg-6989
2022-09-14T01:02:56Z
2018-10-18T19:24:26Z
null
['CVE-2017-5638']
Apache Struts vulnerable to remote arbitrary command execution due to improper input validation
Apache Struts versions prior to 2.3.32 and 2.5.10.1 contain incorrect exception handling and error-message generation during file-upload attempts using the Jakarta Multipart parser, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.31'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.10.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5638'}, {'type': 'WEB', 'url': 'https://github.com/rapid7/metasploit-framework/issues/8064'}, {'type': 'WEB', 'url': 'https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-045'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-046'}, {'type': 'WEB', 'url': 'https://exploit-db.com/exploits/41570'}, {'type': 'WEB', 'url': 'https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=352306493971e7d5a756d61780d57a76eb1f519a'}, {'type': 'WEB', 'url': 'https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=6b8272ce47160036ed120a48345d9aa884477228'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j77q-2qqg-6989'}, {'type': 'WEB', 'url': 'https://github.com/mazen160/struts-pwn'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03733en_us'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03749en_us'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03723en_us'}, {'type': 'WEB', 'url': 'https://isc.sans.edu/diary/22169'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20170310-0001/'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-045.html'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-046.html'}, {'type': 'WEB', 'url': 'https://support.lenovo.com/us/en/product_security/len-14200'}, {'type': 'WEB', 'url': 'https://twitter.com/theog150/status/841146956135124993'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/41614/'}, {'type': 'WEB', 'url': 'https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/834067'}, {'type': 'WEB', 'url': 'https://www.symantec.com/security-center/network-protection-security-advisories/SA145'}, {'type': 'WEB', 'url': 'http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html'}, {'type': 'WEB', 'url': 'http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/'}, {'type': 'WEB', 'url': 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt'}, {'type': 'WEB', 'url': 'http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96729'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1037973'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:23Z', 'nvd_published_at': '2017-03-11T02:59:00Z'}
1.4.0
GHSA-cggj-fvv3-cqwv
2022-04-26T18:57:07Z
2018-10-16T17:45:18Z
null
['CVE-2018-7489']
FasterXML jackson-databind allows unauthenticated remote code execution
FasterXML jackson-databind before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.11.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7489'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/1931'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1447'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1448'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1449'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1450'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1451'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1786'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2088'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2089'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2090'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2939'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cggj-fvv3-cqwv'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180328-0001/'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4190'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103203'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040693'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041890'}]
{'cwe_ids': ['CWE-184', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:30Z', 'nvd_published_at': '2018-02-26T15:29:00Z'}
1.4.0
GHSA-gfx6-ph4q-q54q
2022-09-14T19:20:48Z
2018-10-22T20:53:02Z
null
['CVE-2017-1000118']
Improper Restriction of Operations within the Bounds of a Memory Buffer in akka-http-core
Akka HTTP versions <= 10.0.5 Illegal Media Range in Accept Header Causes StackOverflowError Leading to Denial of Service
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.akka:akka-http-core_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.akka:akka-http-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000118'}, {'type': 'WEB', 'url': 'https://doc.akka.io/docs/akka-http/10.0.6/security/2017-05-03-illegal-media-range-in-accept-header-causes-stackoverflowerror.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gfx6-ph4q-q54q'}]
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:14Z', 'nvd_published_at': None}
1.4.0
GHSA-f5cf-f7px-xpmh
2021-09-09T21:40:11Z
2018-10-16T19:50:27Z
null
['CVE-2016-2166']
Moderate severity vulnerability that affects org.apache.qpid:proton-j
The (1) proton.reactor.Connector, (2) proton.reactor.Container, and (3) proton.utils.BlockingConnection classes in Apache Qpid Proton before 0.12.1 improperly use an unencrypted connection for an amqps URI scheme when SSL support is unavailable, which might allow man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:proton-j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2166'}, {'type': 'WEB', 'url': 'https://git-wip-us.apache.org/repos/asf?p=qpid-proton.git;h=a058585'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f5cf-f7px-xpmh'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/PROTON-1157'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d@%3Ccommits.qpid.apache.org%3E'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182414.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html'}, {'type': 'WEB', 'url': 'http://qpid.apache.org/releases/qpid-proton-0.12.1/release-notes.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/537864/100/0/threaded'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:46Z', 'nvd_published_at': None}
1.4.0
GHSA-7c2r-3jqf-c9rw
2022-09-14T00:19:56Z
2018-10-18T17:43:28Z
null
['CVE-2016-7051']
jackson-dataformat-xml vulnerable to server side request forgery (SSRF)
Versions of jackson-dataformat-xml) prior to 2.7.8 and prior to 2.8.4 allow remote attackers to conduct server-side request forgery (SSRF) attacks via vectors related to a DTD.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.dataformat:jackson-dataformat-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.dataformat:jackson-dataformat-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7051'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformat-xml/issues/211'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1378673'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-dataformat-xml'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7c2r-3jqf-c9rw'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97688'}]
{'cwe_ids': ['CWE-611', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:20Z', 'nvd_published_at': None}
1.4.0
GHSA-m9w8-v359-9ffr
2022-11-17T19:38:02Z
2018-10-19T16:42:27Z
null
['CVE-2018-11775']
Improper Certificate Validation in Apache activemq-client
TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.15.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11775'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m9w8-v359-9ffr'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/activemq'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105335'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041618'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:46Z', 'nvd_published_at': '2018-09-10T20:29:00Z'}
1.4.0
GHSA-269m-695x-j34p
2023-08-28T10:49:23Z
2018-10-19T16:41:04Z
null
['CVE-2017-15702']
Apache Qpid Broker vulnerable to authentication port spoofing
Apache Qpid Broker-J versions 0.18 through 0.32 are vulnerable to authentication port spoofing. When the broker is configured with different authentication providers on different ports, one of which is an HTTP port, then the broker can be tricked by a remote unauthenticated attacker connecting to the HTTP port into using an authentication provider that was configured on a different port. The attacker still needs valid credentials with the authentication provider on the spoofed port. This becomes an issue when the spoofed port has weaker authentication protection (e.g., anonymous access, default accounts) and is normally protected by firewall rules or similar which can be circumvented by this vulnerability. AMQP ports are not affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-broker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18'}, {'fixed': '6.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.32'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15702'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-269m-695x-j34p'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/qpid-broker-j'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/QPID-8039'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/59d241e30db23b8b0af26bb273f789aa1f08515d3dc1a3868d3ba090@%3Cdev.qpid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://qpid.apache.org/cves/CVE-2017-15702.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102040'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:29Z', 'nvd_published_at': None}
1.4.0
GHSA-cf3c-fffp-34qh
2023-09-05T15:09:02Z
2018-10-29T19:05:38Z
null
['CVE-2018-14572']
conference-scheduler-cli Arbitrary Code Execution
In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'conference-scheduler-cli'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14572'}, {'type': 'WEB', 'url': 'https://github.com/PyconUK/ConferenceScheduler-cli/issues/19'}, {'type': 'PACKAGE', 'url': 'https://github.com/PyconUK/ConferenceScheduler-cli'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cf3c-fffp-34qh'}, {'type': 'WEB', 'url': 'https://joel-malwarebenchmark.github.io/blog/2020/04/25/cve-2018-14572-conference-scheduler-cli/'}]
{'cwe_ids': ['CWE-502', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:12Z', 'nvd_published_at': None}
1.4.0
GHSA-j68r-23hj-xf9c
2023-09-07T20:36:05Z
2018-10-10T17:28:14Z
null
['CVE-2017-16064']
node-openssl is malware
The `node-openssl` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-openssl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16064'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j68r-23hj-xf9c'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/503'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:11Z', 'nvd_published_at': None}
1.4.0
GHSA-rcpf-vj53-7h2m
2022-06-24T19:58:42Z
2018-10-17T20:02:20Z
null
['CVE-2018-1257']
Denial of Service in org.springframework:spring-core
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1257'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1809'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rcpf-vj53-7h2m'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-1257'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104260'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:25Z', 'nvd_published_at': '2018-05-11T20:29:00Z'}
1.4.0
GHSA-2x83-r56g-cv47
2020-06-16T20:53:18Z
2018-10-17T00:05:15Z
null
['CVE-2012-6153']
High severity vulnerability that affects org.apache.httpcomponents:httpclient
http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6153'}, {'type': 'WEB', 'url': 'https://access.redhat.com/solutions/1165533'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1129916'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2x83-r56g-cv47'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1098.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1833.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1834.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1835.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1836.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1891.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1892.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0125.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0158.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0675.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0720.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0765.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0850.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0851.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1888.html'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1411705'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/69257'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2769-1'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:18Z', 'nvd_published_at': None}
1.4.0
GHSA-8336-mxp6-v5h9
2021-06-11T15:34:21Z
2018-10-16T19:51:18Z
null
['CVE-2018-12087']
Moderate severity vulnerability that affects OPCFoundation.NetStandard.Opc.Ua
Failure to validate certificates in OPC Foundation UA Client Applications communicating without security allows attackers with control over a piece of network infrastructure to decrypt passwords.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.353.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.352.12'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12087'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8336-mxp6-v5h9'}, {'type': 'WEB', 'url': 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12087.pdf'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:04Z', 'nvd_published_at': None}
1.4.0
GHSA-h8q5-g2cj-qr5h
2022-04-26T21:46:04Z
2018-10-17T15:43:25Z
null
['CVE-2018-11796']
Apache Tika is vulnerable to entity expansions which can lead to a denial of service attack
In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1'}, {'fixed': '1.19.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11796'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h8q5-g2cj-qr5h'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tika'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190903-0002/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105585'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:33Z', 'nvd_published_at': None}
1.4.0
GHSA-fv7x-4hpc-hf9f
2020-06-16T21:35:15Z
2018-10-18T16:57:21Z
null
['CVE-2017-12631']
Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-spring, org.apache.cxf.fediz:fediz-spring2, and org.apache.cxf.fediz:fediz-spring3
Apache CXF Fediz ships with a number of container-specific plugins to enable WS-Federation for applications. A CSRF (Cross Style Request Forgery) style vulnerability has been found in the Spring 2, Spring 3 and Spring 4 plugins in versions before 1.4.3 and 1.3.3. The vulnerability can result in a security context that is set up using a malicious client's roles for the given enduser.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12631'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fv7x-4hpc-hf9f'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://cxf.547215.n5.nabble.com/Apache-CXF-Fediz-1-4-3-and-1-3-3-released-with-a-new-security-advisory-CVE-2017-12631-td5785868.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102127'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040487'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:15Z', 'nvd_published_at': '2017-11-30T14:29:00Z'}
1.4.0
GHSA-w3gh-g32m-cvhr
2020-06-16T21:59:21Z
2018-10-18T16:56:47Z
null
['CVE-2018-8038']
High severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fediz:fediz-jetty9, org.apache.cxf.fediz:fediz-spring, org.apache.cxf.fediz:fediz-spring2, and org.apache.cxf.fediz:fediz-spring3
Versions of Apache CXF Fediz prior to 1.4.4 do not fully disable Document Type Declarations (DTDs) when either parsing the Identity Provider response in the application plugins, or in the Identity Provider itself when parsing certain XML-based parameters.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-spring3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-jetty8'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.fediz:fediz-jetty9'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8038'}, {'type': 'WEB', 'url': 'https://github.com/apache/cxf-fediz/commit/b6ed9865d0614332fa419fe4b6d0fe81bc2e660d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w3gh-g32m-cvhr'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f0a6a05ec3b3a00458da43712b0ff3a2f573175d9bfb39fb0de21424@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2018-8038.txt.asc'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041220'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:21Z', 'nvd_published_at': '2018-07-05T13:29:00Z'}
1.4.0
GHSA-jc8g-xhw5-6x46
2022-07-07T21:42:15Z
2018-10-16T19:59:05Z
null
['CVE-2018-0786']
Improper Certificate Validation in Microsoft .NET Framework components
Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.UniversalWindowsPlatform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.UniversalWindowsPlatform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.UniversalWindowsPlatform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.UniversalWindowsPlatform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.6'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Primitives'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}], 'versions': ['4.4.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Primitives'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Primitives'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}], 'versions': ['4.4.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.NetTcp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}], 'versions': ['4.4.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.NetTcp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.NetTcp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Duplex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}], 'versions': ['4.4.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Duplex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Duplex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.1'}, {'fixed': '4.0.2'}]}], 'versions': ['4.0.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}], 'versions': ['4.4.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.ServiceModel.Security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.1'}, {'fixed': '4.0.2'}]}], 'versions': ['4.0.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Private.ServiceModel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}], 'versions': ['4.4.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Private.ServiceModel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}], 'versions': ['4.3.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Private.ServiceModel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0786'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/51'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jc8g-xhw5-6x46'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0786'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/System.ServiceModel.Duplex#versions-body-tab'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:03Z', 'nvd_published_at': '2018-01-10T01:29:00Z'}
1.4.0
GHSA-2mp8-qvqm-3xwq
2023-09-26T11:23:36Z
2018-10-17T00:04:31Z
null
['CVE-2017-14868']
Restlet Framework Ja-rs extension is vulnerable to XXE when using SimpleXMLProvider
Restlet Framework before 2.3.11, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an XXE attack in a REST API HTTP request. This affects use of the Jax-rs extension.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.restlet.jse:org.restlet.ext.jaxrs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14868'}, {'type': 'WEB', 'url': 'https://github.com/restlet/restlet-framework-java/issues/1286'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2mp8-qvqm-3xwq'}, {'type': 'PACKAGE', 'url': 'https://github.com/restlet/restlet-framework-java'}, {'type': 'WEB', 'url': 'https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements'}, {'type': 'WEB', 'url': 'https://lgtm.com/blog/restlet_CVE-2017-14868'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:36Z', 'nvd_published_at': None}
1.4.0
GHSA-j8g6-2wh7-6439
2022-04-26T21:47:39Z
2018-10-17T15:44:36Z
null
['CVE-2016-6809']
Apache Tika allows Java code execution for serialized objects embedded in MATLAB files
Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6809'}, {'type': 'WEB', 'url': 'https://dist.apache.org/repos/dist/release/tika/CHANGES-1.14.txt'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j8g6-2wh7-6439'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/91eb639ef619b9a26b40020ca6732e7dbe457f7322ed5f1df49e411a@%3Cdev.nutch.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d2375da29d89e679abf5d845db76d6f798fdc6f7d44f2c788e8a0fb9@%3Cuser.nutch.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e414754a6c57ce7194b731e211cd6b2cbb41f2c7000e3fb9c6b6ec78@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f6f6c130b12b7332f323f74d031072b1517065ce28a22346791ffb6@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd3646bb724b66b1a9ddef69e692da2b7a727a8799551c78eedf0a0f@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'http://seclists.org/bugtraq/2016/Nov/40'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/94247'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:46Z', 'nvd_published_at': None}
1.4.0
GHSA-w4g2-9hj6-5472
2021-09-20T22:35:57Z
2018-10-18T18:06:08Z
null
['CVE-2018-11087']
Moderate severity vulnerability that affects com.rabbitmq:amqp-client and org.springframework.amqp:spring-amqp
Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp:spring-amqp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp:spring-amqp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.rabbitmq:amqp-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.rabbitmq:amqp-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11087'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w4g2-9hj6-5472'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-11087'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:27Z', 'nvd_published_at': None}
1.4.0
GHSA-c77r-6f64-478q
2023-09-07T20:32:14Z
2018-10-18T16:49:40Z
null
['CVE-2017-2582']
keycloak-core discloses system properties
It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2582'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c77r-6f64-478q'}]
{'cwe_ids': ['CWE-200', 'CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:22Z', 'nvd_published_at': None}
1.4.0
GHSA-9gp4-qrff-c648
2021-09-07T21:35:29Z
2018-10-18T18:04:13Z
null
['CVE-2016-1000345']
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000345'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9gp4-qrff-c648'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3727-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:32Z', 'nvd_published_at': None}
1.4.0
GHSA-f26x-pr96-vw86
2021-09-09T21:34:07Z
2018-10-16T17:43:45Z
null
['CVE-2018-11040']
Moderate severity vulnerability that affects org.springframework:spring-core
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11040'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f26x-pr96-vw86'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-11040'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}]
{'cwe_ids': ['CWE-829'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:24Z', 'nvd_published_at': '2018-06-25T15:29:00Z'}
1.4.0
GHSA-pgv6-jrvv-75jp
2020-06-16T22:04:41Z
2018-10-09T00:34:30Z
2020-06-16T21:49:08Z
[]
Moderate severity vulnerability that affects send
Withdrawn, accidental duplicate publish. visionmedia send before 0.8.4 for Node.js uses a partial comparison for verifying whether a directory is within the document root, which allows remote attackers to access restricted directories, as demonstrated using "public-restricted" under a "public" directory.
[]
[{'package': {'ecosystem': 'npm', 'name': 'send'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6394'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pgv6-jrvv-75jp'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:08Z', 'nvd_published_at': None}
1.4.0
GHSA-cgpw-2gph-2r9g
2021-12-03T14:28:10Z
2018-10-16T19:59:59Z
null
[]
Moderate severity vulnerability that affects Microsoft.AspNetCore.All, Microsoft.AspNetCore.App, and Microsoft.AspNetCore.Server.Kestrel.Core
Microsoft is aware of a denial of service vulnerability in ASP.NET Core when a malformed request is terminated. An attacker who successfully exploited this vulnerability could cause a denial of service attack. The update addresses the vulnerability by correcting how ASP.NET Core handles such requests.
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/311'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cgpw-2gph-2r9g'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:39Z', 'nvd_published_at': None}
1.4.0
GHSA-qh3m-qw6v-qvhg
2020-06-16T21:51:57Z
2018-10-17T16:20:32Z
null
['CVE-2018-12544']
Moderate severity vulnerability that affects io.vertx:vertx-core
In version from 3.5.Beta1 to 3.5.3 of Eclipse Vert.x, the OpenAPI XML type validator creates XML parsers without taking appropriate defense against XML attacks. This mechanism is exclusively when the developer uses the Eclipse Vert.x OpenAPI XML type validator to validate a provided schema.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12544'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/issues/1021'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2946'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539568'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qh3m-qw6v-qvhg'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:57Z', 'nvd_published_at': None}
1.4.0
GHSA-j378-6mmw-hqfr
2022-10-26T18:56:19Z
2018-10-16T19:56:38Z
null
['CVE-2018-8409']
Denial of service vulnerability exists when System.IO.Pipelines improperly handles requests
A denial of service vulnerability exists when System.IO.Pipelines improperly handles requests, aka "System.IO.Pipelines Denial of Service." This affects .NET Core 2.1, System.IO.Pipelines, ASP.NET Core 2.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.3'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.3'}}, {'package': {'ecosystem': 'NuGet', 'name': 'System.IO.Pipelines'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.1'}]}], 'versions': ['4.5.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8409'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j378-6mmw-hqfr'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8409'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105223'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:41Z', 'nvd_published_at': '2018-09-13T00:29:00Z'}
1.4.0
GHSA-4446-656p-f54g
2023-08-18T14:24:20Z
2018-10-17T16:23:12Z
null
['CVE-2018-1000613']
Deserialization of Untrusted Data in Bouncy castle
Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs starting in version 1.57 and prior to version 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT private key can result in the execution of unexpected code. This attack appear to be exploitable via A handcrafted private key can include references to unexpected classes which will be picked up from the class path for the executing application. This vulnerability appears to have been fixed in 1.60 and later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15on'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.57'}, {'fixed': '1.60'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000613'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/cc9f91c41be67e88fca4e38f4872418448950fd9'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4446-656p-f54g'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190204-0003/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html'}]
{'cwe_ids': ['CWE-470', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:10Z', 'nvd_published_at': '2018-07-09T20:29:00Z'}
1.4.0
GHSA-vf4q-8mr7-5c5c
2022-04-26T19:18:08Z
2018-10-16T23:05:58Z
null
['CVE-2017-12634']
Camel-castor component in Apache Camel is vulnerable to Java object de-serialisation
The camel-castor component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-castor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.19.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-castor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20.0'}, {'fixed': '2.20.1'}]}], 'versions': ['2.20.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12634'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0319'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vf4q-8mr7-5c5c'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-11929'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://camel.apache.org/security-advisories.data/CVE-2017-12634.txt.asc'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101876'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:33Z', 'nvd_published_at': None}
1.4.0
GHSA-w285-wf9q-5w69
2022-04-27T13:36:22Z
2018-10-17T16:27:38Z
null
['CVE-2016-1000352']
In Bouncy Castle JCE Provider the ECIES implementation allowed the use of ECB mode
In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.56'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000352'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w285-wf9q-5w69'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181127-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]
{'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:14Z', 'nvd_published_at': None}
1.4.0
GHSA-xcrm-qpp8-hcw4
2021-09-21T22:29:46Z
2018-10-16T19:35:55Z
null
['CVE-2017-15707']
Moderate severity vulnerability that affects org.apache.struts:struts2-rest-plugin
In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-rest-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.14'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15707'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-054'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xcrm-qpp8-hcw4'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20171214-0001/'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102021'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039946'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:58Z', 'nvd_published_at': None}
1.4.0
GHSA-96jq-75wh-2658
2021-06-15T16:34:38Z
2018-10-16T20:51:15Z
null
['CVE-2018-8032']
Moderate severity vulnerability that affects apache axis
Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.axis:axis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'axis:axis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8032'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-96jq-75wh-2658'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AXIS-2924'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00015.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060@Atlassian.JIRA%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:45Z', 'nvd_published_at': '2018-08-02T13:29:00Z'}
1.4.0
GHSA-9rgv-h7x4-qw8g
2023-08-18T16:47:12Z
2018-10-19T16:15:56Z
null
['CVE-2018-12536']
Eclipse Jetty Server generates error message containing sensitive information
In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn't match a dynamic url-pattern, and is eventually handled by the DefaultServlet's static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.11.v20180605'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.10.v20180503'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.3.24.v20180605'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.3.23.v20180228'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12536'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535670'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181014-0001/'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200516001904/http://www.securitytracker.com/id/1041194'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:36Z', 'nvd_published_at': '2018-06-27T17:29:00Z'}
1.4.0
GHSA-6cw8-7j6c-hccp
2020-06-16T21:18:56Z
2018-10-19T17:43:36Z
null
['CVE-2018-12537']
Moderate severity vulnerability that affects io.vertx:vertx-core
In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12537'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/vert.x/issues/2470'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2371'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536038'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1591072'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6cw8-7j6c-hccp'}, {'type': 'WEB', 'url': 'https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2018-021_vertx.txt'}]
{'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:56Z', 'nvd_published_at': None}
1.4.0
GHSA-vgvf-9jh3-fg75
2022-09-14T19:14:19Z
2018-10-19T16:46:30Z
null
['CVE-2017-1000207']
Deserialization of Untrusted Data in swagger-codegen
A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.swagger:swagger-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.swagger:swagger-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000207'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-parser/pull/481'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vgvf-9jh3-fg75'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-parser'}, {'type': 'WEB', 'url': 'https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:48Z', 'nvd_published_at': None}