schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringclasses
11 values
aliases
stringlengths
2
20
summary
stringlengths
4
172
details
stringlengths
47
3.95k
severity
stringlengths
2
79
affected
stringlengths
76
3.32k
references
stringlengths
82
11.3k
database_specific
stringlengths
131
190
1.4.0
GHSA-j59f-6m4q-62h6
2021-08-04T21:17:50Z
2019-05-30T17:28:48Z
null
[]
Improper Key Verification in ipns
Versions 0.1.1 or 0.1.2 of `ipns` are vulnerable to improper key validation. This is due to the public key verification was not being performed properly, resulting in any key being valid. ## Recommendation Update to version 0.1.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/'}]
[{'package': {'ecosystem': 'npm', 'name': 'ipns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ipfs/js-ipns/commit/33684e356f1f2fdcd99b2fb85fcc5d52223769a0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/693'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:28:19Z', 'nvd_published_at': None}
1.4.0
GHSA-p72p-rjr2-r439
2020-08-31T18:35:03Z
2019-05-29T20:24:02Z
null
[]
Server-Side Request Forgery in terriajs-server
Versions of `terriajs-server`prior to 2.7.4 are vulnerable to Server-Side Request Forgery (SSRF). If an attacker has access to a server whitelisted by the terriajs-server proxy or if the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the attacker can use the terriajs-server proxy to access any HTTP-accessible resources that are accessible to the server, including private resources in the hosting environment. ## Recommendation Upgrade to version 2.7.4 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'terriajs-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0'}, {'type': 'WEB', 'url': 'https://medium.com/terria/security-vulnerability-in-terriajs-server-82c8bf4da0a5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/768'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T20:23:25Z', 'nvd_published_at': None}
1.4.0
GHSA-xrmp-99wj-p6jc
2021-08-04T21:21:43Z
2019-05-31T23:43:09Z
null
[]
Prototype Pollution in deap
Versions of `deap` before 1.0.1 are vulnerable to prototype pollution. ## Recommendation Update to version 1.0.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'deap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/310446'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:deap:20180415'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/611'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:42:34Z', 'nvd_published_at': None}
1.4.0
GHSA-cqcf-4g4h-rghf
2021-05-11T16:14:58Z
2019-05-14T04:00:31Z
null
['CVE-2019-0213']
Cross-site scripting in Apache Archiva
In Apache Archiva before 2.2.4, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0213'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3@%3Cusers.archiva.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97@%3Cusers.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Apr/47'}, {'type': 'WEB', 'url': 'http://archiva.apache.org/security.html#CVE-2019-0213'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/30/7'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108123'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-03T15:36:51Z', 'nvd_published_at': '2019-04-30T22:29:00Z'}
1.4.0
GHSA-42xw-2xvc-qx8m
2021-07-27T20:36:18Z
2019-05-29T18:04:45Z
null
['CVE-2019-10742']
Denial of Service in axios
Versions of `axios` prior to 0.18.1 are vulnerable to Denial of Service. If a request exceeds the `maxContentLength` property, the package prints an error but does not stop the request. This may cause high CPU usage and lead to Denial of Service. ## Recommendation Upgrade to 0.18.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'axios'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.18.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10742'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/issues/1098'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/pull/1485'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/commit/acabfbdf00a58bb866c9d070e8a10d1d0dbeb572'}, {'type': 'WEB', 'url': 'https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-AXIOS-174505'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/880'}]
{'cwe_ids': ['CWE-20', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T15:22:47Z', 'nvd_published_at': '2019-05-07T19:29:00Z'}
1.4.0
GHSA-vmhw-fhj6-m3g5
2020-08-31T18:31:33Z
2019-05-31T23:46:33Z
null
[]
Path Traversal in angular-http-server
Versions of `angular-http-server` before 1.4.4 are vulnerable to path traversal. ## Recommendation Update to version 1.4.4 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'angular-http-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/simonh1000/angular-http-server/commit/8bafc9577161469f5dea01e0b98ea9c525d063e9'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/330349'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/656'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:44:08Z', 'nvd_published_at': None}
1.4.0
GHSA-ww4x-rwq6-qpgf
2023-08-29T14:15:24Z
2019-05-29T19:11:31Z
null
['CVE-2015-9284']
OmniAuth Ruby gem Cross-site Request Forgery in request phase
The request phase of the OmniAuth Ruby gem (1.9.2 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account. As of v2 OmniAuth no longer has the vulnerable configuration by default, but it is still possible to configure OmniAuth in such a way that the web application becomes vulnerable to Cross-Site Request Forgery. There is a recommended remediation described [here](https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9284'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/issues/1031'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth-rails/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/pull/809'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/commit/aef9f623c0be838234d53baf18977564804da397'}, {'type': 'PACKAGE', 'url': 'https://github.com/omniauth/omniauth'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/releases/tag/v1.9.2'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/releases/tag/v2.0.0'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth/CVE-2015-9284.yml'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2015/05/26/11'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:10:54Z', 'nvd_published_at': None}
1.4.0
GHSA-xf7w-r453-m56c
2021-08-04T20:12:16Z
2019-05-30T17:19:34Z
null
['CVE-2019-13173']
Arbitrary File Overwrite in fstream
Versions of `fstream` prior to 1.0.12 are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. The `fstream.DirWriter()` function is vulnerable. ## Recommendation Upgrade to version 1.0.12 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'fstream'}, 'ecosystem_specific': {'affected_functions': ['fstream.DirWriter']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13173'}, {'type': 'WEB', 'url': 'https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4123-1/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/886'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00052.html'}]
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:17:33Z', 'nvd_published_at': None}
1.4.0
GHSA-jj6g-7j8p-7gf2
2020-08-31T18:29:43Z
2019-05-30T21:03:24Z
null
[]
Cross-Site Scripting in bracket-template
All versions of `bracket-template` are vulnerable to stored cross-site scripting (XSS). This is exploitable when a variable passed in via a GET parameter is used in a template. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
[]
[{'package': {'ecosystem': 'npm', 'name': 'bracket-template'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.5'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/317125'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/608'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T21:02:27Z', 'nvd_published_at': None}
1.4.0
GHSA-h896-mx9x-g32g
2022-11-17T17:55:41Z
2019-05-29T18:15:50Z
null
['CVE-2019-0188']
XML External Entity injection in Apache Camel
Apache Camel prior to 2.24.0 contains an XML external entity injection (XXE) vulnerability (CWE-611) due to using an outdated vulnerable JSON-lib library. This affects only the camel-xmljson component, which was removed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.24.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-xmljson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.23.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0188'}, {'type': 'WEB', 'url': 'https://github.com/apache/camel/blob/master/docs/user-manual/en/security-advisories/CVE-2019-0188.txt.asc'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TAMAYA-410'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/00118387610522b107cbdcec5369ddd512b576ff0236a02bfca12f44@%3Cusers.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/45349f8bd98c1c13a84beddede18fe79b8619ebab99d90f1fb43d7ab@%3Cdev.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/61601cda2c5f9832184ea14647b0c0589c94126a460c8eb196be1313@%3Ccommits.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/63d1cec8541befeb59dbed23a6b227bdcca7674aa234fb43354dac82@%3Ccommits.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6fefbd90f7fb4c8412d85ea3e9e97a4b76b47e206f502c73c29dc0b7@%3Ccommits.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/84ba9b79e801a4148dde73d1969cdae0247d11ff63de7ce11b394dc5@%3Ccommits.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eed73fc18d4fa3e2341cd0ab101b47f06b16c7efc1cb73791c524c9d@%3Cdev.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fe74d173689600d9a395d026f0bf5d154c0bf7bd195ecfbc2c987036@%3Cdev.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN71498764/index.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/05/24/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108422'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:15:06Z', 'nvd_published_at': '2019-05-28T19:29:00Z'}
1.4.0
GHSA-78j5-gcmf-vqc8
2021-10-06T22:02:18Z
2019-05-29T18:02:59Z
null
['CVE-2019-14772']
Cross-Site Scripting (XSS) in Verdaccio
### Impact What kind of vulnerability is it? Who is impacted? Cross-Site Scripting XSS, malicious packages with content Javascript that might be executed in the User Interface stealing user credentials. ### Patches Has the problem been patched? What versions should users upgrade to? Users that still using `v3` must upgrade to **>3.12.0** or those have no problem to migrate to a major version **>=4.0.0** also fix the issue. ### Workarounds Is there a way for users to fix or remediate the vulnerability without upgrading? No, the users must update. ### References Are there any links users can visit to find out more? https://www.npmjs.com/advisories/832 https://www.npmjs.com/advisories/833 The issue was reported by the NPMJS Security Team ### For more information If you have any questions or comments about this advisory: * Read the Security Policy to find the ways to be in contact with us.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'verdaccio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/verdaccio/verdaccio/security/advisories/GHSA-78j5-gcmf-vqc8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14772'}, {'type': 'PACKAGE', 'url': 'https://github.com/verdaccio/verdaccio'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/832'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/833'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-28T21:00:51Z', 'nvd_published_at': None}
1.4.0
GHSA-6qqf-vvcr-7qrv
2020-08-31T18:34:48Z
2019-05-23T09:27:22Z
null
[]
Cryptographically Weak PRNG in generate-password
Affected versions of generate-password generate random values that are biased towards certain characters depending on the chosen character sets. This may result in guessable passwords. ## Recommendation Update to version 1.4.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'generate-password'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/brendanashworth/generate-password/pull/26'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/762'}]
{'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-23T07:38:39Z', 'nvd_published_at': None}
1.4.0
GHSA-36m4-6v6m-4vpr
2023-09-08T19:21:19Z
2019-05-29T18:04:55Z
null
['CVE-2019-12043']
Cross-site Scripting in remarkable
In remarkable 1.7.1, lib/parser_inline.js mishandles URL filtering, which allows attackers to trigger XSS via unprintable characters, as demonstrated by a `\x0ejavascript:` URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'remarkable'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12043'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/issues/332'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/commit/49e87b7ae2dc323d83606792a749fb207595249e'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T01:14:15Z', 'nvd_published_at': '2019-05-13T14:29:00Z'}
1.4.0
GHSA-2hw2-62cp-p9p7
2021-07-27T20:54:44Z
2019-05-29T18:54:11Z
null
['CVE-2019-0201']
Access control bypass in Apache ZooKeeper
An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper?s getACL() command doesn?t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zookeeper:zookeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.4.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.zookeeper:zookeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0201'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4352'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/ZOOKEEPER-1392'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5d9a1cf41a5880557bf680b7321b4ab9a4d206c601ffb15fef6f196a@%3Ccommits.accumulo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f6112882e30a31992a79e0a8c31ac179e9d0de7c708de3a9258d4391@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r40f32125c1d97ad82404cc918171d9e0fcf78e534256674e9da1eb4b@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/05/msg00033.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Jun/13'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190619-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4461'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://zookeeper.apache.org/security.html#CVE-2019-0201'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108427'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:53:55Z', 'nvd_published_at': '2019-05-23T14:29:00Z'}
1.4.0
GHSA-27v7-qhfv-rqq8
2021-08-31T20:56:47Z
2019-05-30T17:26:30Z
null
[]
Insecure Credential Storage in web3
All versions of `web3` are vulnerable to Insecure Credential Storage. The package stores encrypted wallets in local storage and requires a password to load the wallet. Once the wallet is loaded, the private key is accessible via LocalStorage. Exploiting this vulnerability likely requires a Cross-Site Scripting vulnerability to access the private key. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'web3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ethereum/web3.js/issues/2739'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/web3.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WEB3-174533'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/877'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:25:54Z', 'nvd_published_at': None}
1.4.0
GHSA-qr32-j4j6-3m7r
2020-08-31T18:20:27Z
2019-05-29T20:23:00Z
null
['CVE-2017-16087']
Command Injection in fs-git
Affected versions of `fs-git` do not sanitize strings passed into the `buildCommand` method, resulting in arbitrary code execution. ## Recommendation Update to version 1.0.2 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'fs-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16087'}, {'type': 'WEB', 'url': 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998'}, {'type': 'WEB', 'url': 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998#diff-13b5b151431c7e7a17f273559ed212d5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/360'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T20:22:06Z', 'nvd_published_at': None}
1.4.0
GHSA-f554-x222-wgf7
2021-08-04T15:07:00Z
2019-05-29T18:05:03Z
null
['CVE-2013-7285']
Command Injection in Xstream
Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7285'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.mail-archive.com/user@xstream.codehaus.org/msg00604.html'}, {'type': 'WEB', 'url': 'https://www.mail-archive.com/user@xstream.codehaus.org/msg00607.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2013-7285.html'}, {'type': 'WEB', 'url': 'http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/69'}, {'type': 'WEB', 'url': 'http://web.archive.org/web/20140204133306/http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html'}]
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-05-15T23:13:58Z', 'nvd_published_at': '2019-05-15T17:29:00Z'}
1.4.0
GHSA-g99m-3m46-4gm9
2021-08-03T21:31:13Z
2019-05-14T04:00:47Z
null
['CVE-2018-17202']
Infinite Loop in Apache Sanselan
Certain input files could make the code to enter into an infinite loop when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sanselan:sanselan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.97-incubator'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17202'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/69204376d12205b0d2d90e6fcbeebb99b894e6db88c8ff565c4e1efa@%3Cdev.commons.apache.org%3E'}]
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-09T15:07:18Z', 'nvd_published_at': '2019-05-06T18:29:00Z'}
1.4.0
GHSA-jxgm-9f58-w4xp
2021-07-27T20:35:40Z
2019-05-14T04:00:21Z
null
['CVE-2019-0214']
Improper Input Validation in Apache Archiva
In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0214'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e@%3Cusers.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda@%3Cusers.archiva.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Apr/48'}, {'type': 'WEB', 'url': 'http://archiva.apache.org/security.html#CVE-2019-0214'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/30/8'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108124'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-03T15:33:48Z', 'nvd_published_at': '2019-04-30T22:29:00Z'}
1.4.0
GHSA-4wjq-69rc-8wcp
2022-11-17T17:45:21Z
2019-05-02T15:21:34Z
null
['CVE-2019-0194']
Path Traversal in Apache Camel
Apache Camel's File is vulnerable to directory traversal. Camel 2.21.0 to 2.21.3, 2.22.0 to 2.22.2, 2.23.0 and the unsupported Camel 2.x (2.19 and earlier) versions may be also affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.21.0'}, {'fixed': '2.21.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.21.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.22.0'}, {'fixed': '2.22.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.23.0'}, {'fixed': '2.23.1'}]}], 'versions': ['2.23.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0194'}, {'type': 'WEB', 'url': 'https://github.com/apache/camel/pull/2700'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-13042'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0a163d02169d3d361150e8183df4af33f1a3d8a419b2937ac8e6c66f@%3Cusers.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/45e23ade8d3cb754615f95975e89e8dc73c59eeac914f07d53acbac6@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/30/2'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-02T15:00:07Z', 'nvd_published_at': '2019-04-30T22:29:00Z'}
1.4.0
GHSA-87mg-h5r3-hw88
2021-09-16T21:01:13Z
2019-05-30T17:23:28Z
null
[]
Cross-Site Scripting in bootbox
All version of `bootbox` are vulnerable to Cross-Site Scripting. The package does not sanitize user input in the provided dialog boxes, allowing attackers to inject HTML code and execute arbitrary JavaScript. ## Recommendation Sanitize user input being passed to `bootbox` or consider using an alternative package.
[]
[{'package': {'ecosystem': 'npm', 'name': 'bootbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/makeusabrew/bootbox/issues/661'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/508446'}, {'type': 'PACKAGE', 'url': 'https://github.com/makeusabrew/bootbox'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/882'}]
{'cwe_ids': ['CWE-64', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:22:56Z', 'nvd_published_at': None}
1.4.0
GHSA-5ww9-j83m-q7qx
2023-09-13T16:21:31Z
2019-05-23T09:32:24Z
null
['CVE-2019-12086']
Information exposure in FasterXML jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12086'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2326'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2935'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2936'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3046'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3050'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.9'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88cd25375805950ae7337e669b0cb0eeda98b9604c1b8d806dccbad2@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/05/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227030031/http://www.securityfocus.com/bid/109227'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200808181049/http://russiansecurity.expert/2016/04/20/mysql-connect-file-read/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-22T04:34:56Z', 'nvd_published_at': '2019-05-17T17:29:00Z'}
1.4.0
GHSA-h9gj-rqrw-x4fq
2021-06-15T17:07:00Z
2019-05-14T04:02:24Z
null
['CVE-2019-0227']
Server Side Request Forgery in Apache Axis
A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.axis:axis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0227'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd@%3Cjava-user.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-03T15:21:34Z', 'nvd_published_at': '2019-05-01T21:29:00Z'}
1.4.0
GHSA-j44m-qm6p-hp7m
2021-08-03T21:28:27Z
2019-05-01T18:37:31Z
null
['CVE-2018-20834']
Arbitrary File Overwrite in tar
Versions of `tar` prior to 4.4.2 for 4.x and 2.2.2 for 2.x are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. ## Recommendation For tar 4.x, upgrade to version 4.4.2 or later. For tar 2.x, upgrade to version 2.2.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Extract']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20834'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/344595'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1821'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-tar/commits/v2.2.2'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-tar/compare/58a8d43...a5f7779'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/803'}]
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-01T18:35:41Z', 'nvd_published_at': None}
1.4.0
GHSA-xm28-fw2x-fqv2
2021-08-04T21:19:17Z
2019-05-31T23:08:14Z
null
[]
Denial of Service in foreman
All versions of `foreman` are vulnerable to Regular Expression Denial of Service when requests to it are made with a specially crafted path. ## Recommendation Upgrade to version 3.0.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'foreman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/320586'}, {'type': 'WEB', 'url': 'https://github.com/strongloop/node-foreman/blob/v2.0.0/forward.js#L30'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:foreman:20180429'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/645'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:07:09Z', 'nvd_published_at': None}
1.4.0
GHSA-4x49-w62v-76q7
2021-08-03T21:40:51Z
2019-05-23T08:39:23Z
null
['CVE-2019-3799']
Path Traversal in Spring Cloud Config
Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-config-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-config-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-config-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3799'}, {'type': 'WEB', 'url': 'https://github.com/mpgn/CVE-2019-3799'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3799'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-10T04:20:45Z', 'nvd_published_at': '2019-05-06T16:29:00Z'}
1.4.0
GHSA-j4mr-9xw3-c9jx
2020-08-31T18:31:43Z
2019-05-31T23:47:01Z
null
[]
Out-of-bounds Read in base64-url
Versions of `base64-url` before 2.0.0 are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input. ## Recommendation Update to version 2.0.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'base64-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/321692'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/660'}]
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:45:33Z', 'nvd_published_at': None}
1.4.0
GHSA-jjpq-gp5q-8q6w
2021-06-15T17:08:11Z
2019-05-30T03:30:42Z
null
['CVE-2019-0221']
Cross-site scripting in Apache Tomcat
The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.40'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.94'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0221'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3929'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3931'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/43'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190606-0001/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K13184144?utm_source=f5support&amp;utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4128-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4128-2/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4596'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/50'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108545'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T03:30:07Z', 'nvd_published_at': '2019-05-28T22:29:00Z'}
1.4.0
GHSA-pgr8-jg6h-8gw6
2021-08-04T15:26:36Z
2019-05-23T09:26:20Z
null
[]
Cross-Site Scripting in webpack-bundle-analyzer
Versions of `webpack-bundle-analyzer` prior to 3.3.2 are vulnerable to Cross-Site Scripting. The package uses `JSON.stringify()` without properly escaping input which may lead to Cross-Site Scripting. ## Recommendation Upgrade to version 3.3.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'webpack-bundle-analyzer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263'}, {'type': 'WEB', 'url': 'https://github.com/webpack-contrib/webpack-bundle-analyzer/pull/264'}, {'type': 'WEB', 'url': 'https://github.com/webpack-contrib/webpack-bundle-analyzer/commit/20f2b4c553ee343f491faf63e39427fba9908c7c'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WEBPACKBUNDLEANALYZER-174190'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/826'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-23T07:34:50Z', 'nvd_published_at': None}
1.4.0
GHSA-x2mc-8fgj-3wmr
2021-08-03T21:27:51Z
2019-05-01T18:37:18Z
null
['CVE-2018-20835']
Improper Input Validation in tar-fs
A vulnerability was found in tar-fs before 1.16.2. An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tar-fs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20835'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/344595'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/tar-fs/compare/d590fc7...a35ce2f'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-01T18:25:25Z', 'nvd_published_at': '2019-04-30T19:29:00Z'}
1.4.0
GHSA-gh4g-3gm9-5wrq
2021-08-04T16:06:35Z
2019-05-29T18:38:08Z
null
['CVE-2019-12313']
Cross-Site Scripting in shave
Versions of `shave` prior to 2.5.3 are vulnerable to Cross-Site Scripting. The `shave` package overwrites HTML elements and in doing so fails to properly encode the output. If encoded HTML input is passed into `shave` the output will be decoded which may lead to Cross-Site Scripting. ## Recommendation Upgrade to version 2.5.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'shave'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12313'}, {'type': 'WEB', 'url': 'https://github.com/dollarshaveclub/shave/commit/da7371b0531ba14eae48ef1bb1456a3de4cfa954#diff-074799b511e4b61923dfd3f2a3bf9b54R67'}, {'type': 'WEB', 'url': 'https://github.com/dollarshaveclub/shave/compare/852b537...da7371b'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/822'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:37:51Z', 'nvd_published_at': None}
1.4.0
GHSA-rjx9-2936-9ffx
2021-08-03T22:54:50Z
2019-05-14T04:01:06Z
null
['CVE-2018-17201']
Improper Input Validation in Apache Sanselan
Certain input files could make the code hang when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sanselan:sanselan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.97-incubator'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17201'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cd37861963aa6d2694c8947d464c99614d3e1a9db6c1a2a8b7b5840a@%3Cdev.commons.apache.org%3E'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-09T15:10:25Z', 'nvd_published_at': '2019-05-06T18:29:00Z'}
1.4.0
GHSA-vm59-329q-p468
2021-08-03T21:30:31Z
2019-05-14T04:00:37Z
null
['CVE-2018-8035']
Cross-site Scripting in Apache UIMA
This vulnerability relates to the user's browser processing of DUCC webpage input data.The javascript comprising Apache UIMA DUCC (<= 2.2.2) which runs in the user's browser does not sufficiently filter user supplied inputs, which may result in unintended execution of user supplied javascript code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.uima:uima-ducc-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8035'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2f49681259b375d53431605f1c557ef8a3ed0af01a488d2e1b330053@%3Cdev.uima.apache.org%3E'}, {'type': 'WEB', 'url': 'https://uima.apache.org/security_report'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108195'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-03T15:42:34Z', 'nvd_published_at': '2019-05-01T21:29:00Z'}
1.4.0
GHSA-23gj-368h-92pq
2021-08-04T15:17:12Z
2019-05-29T18:05:11Z
null
['CVE-2019-11082']
Path Traversal in DKPro Core
core/api/datasets/internal/actions/Explode.java in the Dataset API in DKPro Core through 1.10.0 allows Directory Traversal, resulting in the overwrite of local files with the contents of an archive.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'de.tudarmstadt.ukp.dkpro.core:de.tudarmstadt.ukp.dkpro.core.api.datasets-asl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11082'}, {'type': 'WEB', 'url': 'https://github.com/dkpro/dkpro-core/issues/1325'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-16T15:34:40Z', 'nvd_published_at': '2019-05-10T16:29:00Z'}
1.4.0
GHSA-2hwp-g4g7-mwwj
2020-08-31T18:35:05Z
2019-05-29T20:25:35Z
null
[]
Reflected Cross-Site Scripting in jquery.terminal
Versions of `jquery.terminal` prior to 1.21.0 are vulnerable to Reflected Cross-Site Scripting. If the application has either of the options `anyLinks` or `invokeMethods` set to true, the application may execute arbitrary JavaScript through crafted malicious payloads due to insufficient sanitization. ## Recommendation Upgrade to version 1.21.0 or later
[]
[{'package': {'ecosystem': 'npm', 'name': 'jquery.terminal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jcubic/jquery.terminal/commit/c8b7727d21960031b62a4ef1ed52f3c634046211'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/769'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T20:24:48Z', 'nvd_published_at': None}
1.4.0
GHSA-8xqr-4cpm-wx7g
2020-08-31T18:31:14Z
2019-05-31T23:47:27Z
null
[]
Cross-Site Scripting in react-svg
Versions of `react-svg` before 2.2.18 are vulnerable to cross-site scripting (xss). This is due to the fact that scripts found in SVG files are run by default. ## Recommendation Update to version 2.2.18 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'react-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.18'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tanem/react-svg/pull/57'}, {'type': 'WEB', 'url': 'https://github.com/tanem/react-svg/pull/57/commits/ec7de5d678f53a085cee1348cb1aa069c9fc42fb'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/648'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:44:58Z', 'nvd_published_at': None}
1.4.0
GHSA-g996-q5r8-w7g2
2023-09-21T18:22:10Z
2019-11-12T23:00:53Z
null
['CVE-2019-10909']
Symfony Cross-site Scripting (XSS) vulnerability
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, validation messages are not escaped, which can lead to XSS when user input is included. This is related to symfony/framework-bundle.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.15'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.6.0'}, {'fixed': '8.6.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10909'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10909.yaml'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-10909'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2019-005'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_19_19'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T16:48:32Z', 'nvd_published_at': '2019-05-16T22:29:00Z'}
1.4.0
GHSA-cff7-6h4q-q5pj
2023-08-25T23:33:30Z
2019-11-14T15:25:51Z
null
['CVE-2019-18848']
JSON-jwt Gem lacked element count during splitting of JWE string
The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'json-jwt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18848'}, {'type': 'WEB', 'url': 'https://github.com/nov/json-jwt/commit/ada16e772906efdd035e3df49cb2ae372f0f948a'}, {'type': 'PACKAGE', 'url': 'https://github.com/nov/json-jwt'}, {'type': 'WEB', 'url': 'https://github.com/nov/json-jwt/compare/v1.10.2...v1.11.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json-jwt/CVE-2019-18848.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/10/msg00001.html'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-14T15:24:51Z', 'nvd_published_at': '2019-11-12T15:15:00Z'}
1.4.0
GHSA-fm68-89m8-4gjj
2023-09-06T13:49:44Z
2019-11-12T22:59:47Z
null
['CVE-2019-8233']
Composer JavaScript injection possible via html comments
In Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1, an unauthenticated user can inject arbitrary JavaScript code as a result of the sanitization engine ignoring HTML comments.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8233'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:12:25Z', 'nvd_published_at': None}
1.4.0
GHSA-425c-ccf3-3jrr
2021-01-08T19:57:59Z
2019-11-15T23:10:35Z
null
['CVE-2019-16762']
Critical severity vulnerability that affects slpjs
## Validator parsing discrepancy due to string encoding ### Impact A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. ### Patches All versions > 0.21.3 are patched. ### Workarounds Upgrade to any version >= 0.21.4. ### References The bug was located and fixed [here](https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701). ### For more information If you have any questions or comments about this advisory: * Open an issue in the [slpjs repo](https://github.com/simpleledger/slpjs/issues) * Email us at [info@slp.cash](mailto:info@slp.cash)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'slpjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-425c-ccf3-3jrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16762'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-425c-ccf3-3jrr'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:55Z', 'nvd_published_at': None}
1.4.0
GHSA-68wg-qv6r-j4vp
2021-08-18T22:44:59Z
2019-11-20T17:44:54Z
null
['CVE-2019-10766']
SQL Injection in usmanhalalit/pixie
Pixie versions 1.0.x before 1.0.3, and 2.0.x before 2.0.2 allow SQL Injection in the limit() function due to improper sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'usmanhalalit/pixie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'usmanhalalit/pixie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10766'}, {'type': 'WEB', 'url': 'https://github.com/usmanhalalit/pixie/commit/9bd991021abbcbfb19347a07dca8b7e518b8abc9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-USMANHALALITPIXIE-534879'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-20T17:42:50Z', 'nvd_published_at': None}
1.4.0
GHSA-pf8f-w267-mq2h
2023-01-23T20:22:08Z
2019-11-15T20:26:59Z
null
['CVE-2019-18978']
The rack-cors rubygem may allow directory traveral
An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack-cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18978'}, {'type': 'WEB', 'url': 'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d'}, {'type': 'PACKAGE', 'url': 'https://github.com/cyu/rack-cors'}, {'type': 'WEB', 'url': 'https://github.com/cyu/rack-cors/compare/v1.0.3...v1.0.4'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/10/msg00000.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4571-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4918'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-15T20:26:35Z', 'nvd_published_at': '2019-11-14T21:15:00Z'}
1.4.0
GHSA-cj8p-53v9-2c26
2023-09-11T14:59:52Z
2019-11-08T15:28:11Z
null
['CVE-2019-15485']
Cross-site Scripting in Bolt
Bolt before 3.6.10 has XSS via createFolder or createFile in `Controller/Async/FilesystemManager.php`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bolt/bolt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15485'}, {'type': 'WEB', 'url': 'https://github.com/bolt/bolt/pull/7800'}, {'type': 'WEB', 'url': 'https://github.com/bolt/bolt/releases/tag/v3.6.10'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-10-01T18:00:46Z', 'nvd_published_at': '2019-08-23T13:15:00Z'}
1.4.0
GHSA-89px-ww3j-g2mm
2021-01-08T21:28:08Z
2019-11-29T17:05:59Z
null
['CVE-2019-16766']
2FA bypass in Wagtail through new device path
## 2FA bypass through new device path ### Impact If someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. ### Patches This problem has been patched in version 1.3.0. ### Workarounds There is no workaround at the moment. ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/labd/wagtail-2fa](https://github.com/labd/wagtail-2fa) * Email us at [security@labdigital.nl](mailto:security@labdigital.nl)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail-2fa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/labd/wagtail-2fa/security/advisories/GHSA-89px-ww3j-g2mm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16766'}, {'type': 'WEB', 'url': 'https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca'}, {'type': 'WEB', 'url': 'https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-89px-ww3j-g2mm'}]
{'cwe_ids': ['CWE-290', 'CWE-304'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:10Z', 'nvd_published_at': None}
1.4.0
GHSA-j9xp-92vc-559j
2021-08-18T22:09:33Z
2019-11-06T17:11:10Z
null
['CVE-2019-10748']
SQL Injection in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the MariaDB and MySQL dialects, which may allow attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation If you are using `sequelize` 5.x, upgrade to version 5.8.11 or later. If you are using `sequelize` 4.x, upgrade to version 4.44.3 or later. If you are using `sequelize` 3.x, upgrade to version 3.35.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.35.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.44.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.8.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10748'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/11089,'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/a72a3f5,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450221'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1018'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-05T19:59:46Z', 'nvd_published_at': None}
1.4.0
GHSA-852q-xxj4-x2rx
2021-08-17T22:41:38Z
2019-11-08T20:05:45Z
null
['CVE-2019-15537']
SQL Injection in SimpleSAMLphp
The proxystatistics module before 3.1.0 for SimpleSAMLphp allows SQL Injection in lib/Auth/Process/DatabaseCommand.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cesnet/simplesamlphp-module-proxystatistics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15537'}, {'type': 'WEB', 'url': 'https://github.com/CESNET/proxystatistics-simplesamlphp-module/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/CESNET/proxystatistics-simplesamlphp-module/releases/tag/v3.1.0'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T12:51:13Z', 'nvd_published_at': '2019-08-23T18:15:00Z'}
1.4.0
GHSA-9xr8-8hmc-389f
2021-08-18T22:47:15Z
2019-11-22T13:45:33Z
null
[]
Cross-Site Scripting in vant
Versions of `vant` prior to 2.1.8 are vulnerable to Cross-Site Scripting. The text value of the `Picker` component column is not sanitized, which may allow attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 2.1.8 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'vant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/youzan/vant/issues/4270'}, {'type': 'WEB', 'url': 'https://github.com/youzan/vant/pull/4278/commits/d777b78c7dc2c904f474d057ea88449cfe2ca13a'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VANT-460461'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1157'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-21T04:18:24Z', 'nvd_published_at': None}
1.4.0
GHSA-m52x-29pq-w3vv
2022-08-03T13:00:22Z
2019-11-22T18:18:03Z
null
['CVE-2019-16763']
Pannellum Cross-Site Scripting due to data not being sanitized for URIs or vbscript
Versions of `pannellum` prior to 2.5.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs for data URIs, which may allow attackers to execute arbitrary code in a victim's browser. ## Recommendation Upgrade to version 2.5.6 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'pannellum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16763'}, {'type': 'WEB', 'url': 'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m52x-29pq-w3vv'}, {'type': 'PACKAGE', 'url': 'https://github.com/mpetroff/pannellum'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1418'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:55Z', 'nvd_published_at': None}
1.4.0
GHSA-4j6x-w426-6rc6
2020-06-16T20:58:26Z
2019-11-08T17:31:17Z
null
[]
Default Express middleware security check is ignored in production
## Default Express middleware security check is ignored in production ### Impact All Cube.js deployments that use affected versions of `@cubejs-backend/api-gateway` with default express authentication middleware in production environment are affected. ### Patches @cubejs-backend/api-gateway@0.11.17 ### Workarounds Override default authentication express middleware: https://cube.dev/docs/@cubejs-backend-server-core#options-reference-check-auth-middleware ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/cube-js/cube.js/issues * Reach out us in community Slack: https://slack.cube.dev/
[]
[{'package': {'ecosystem': 'npm', 'name': '@cubejs-backend/api-gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.11.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.11.16'}}]
[{'type': 'WEB', 'url': 'https://github.com/cube-js/cube.js/security/advisories/GHSA-4j6x-w426-6rc6'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4j6x-w426-6rc6'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:26Z', 'nvd_published_at': None}
1.4.0
GHSA-cg8j-8w52-735v
2021-12-03T14:39:16Z
2019-11-12T23:01:25Z
null
['CVE-2019-12204']
Missing warning can lead to unauthenticated admin access in SilverStripe
In SilverStripe through 4.3.3, a missing warning about leaving install.php in a public webroot can lead to unauthenticated admin access.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12204'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/silverstripe/cms'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/silverstripe/framework'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2019-12204'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-10-01T18:05:09Z', 'nvd_published_at': None}
1.4.0
GHSA-pwrf-q7h8-jjr7
2021-05-10T17:22:09Z
2019-11-08T20:06:24Z
null
['CVE-2019-16403']
Authorization Bypass Through User-Controlled Key in Bagisto
In Webkul Bagisto before 0.1.5, the functionalities for customers to change their own values (such as address, review, orders, etc.) can also be manipulated by other customers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bagisto/bagisto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16403'}, {'type': 'WEB', 'url': 'https://github.com/bagisto/bagisto/issues/749'}]
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T12:47:46Z', 'nvd_published_at': '2019-09-18T12:15:00Z'}
1.4.0
GHSA-hx83-rpqf-m267
2021-08-18T22:42:32Z
2019-11-20T01:38:00Z
null
['CVE-2018-11768']
user/group information can be corrupted across storing in fsimage and reading back from fsimage
In Apache Hadoop 3.1.0 to 3.1.1, 3.0.0-alpha1 to 3.0.3, 2.9.0 to 2.9.1, and 2.0.0-alpha to 2.8.4, the user/group information can be corrupted across storing in fsimage and reading back from fsimage.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.8.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11768'}, {'type': 'WEB', 'url': 'https://hadoop.apache.org/cve_list.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2067a797b330530a6932f4b08f703b3173253d0a2b7c8c524e54adaf@%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2c9cc65864be0058a5d5ed2025dfb9c700bf23d352b0c826c36ff96a@%3Chdfs-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/72ca514e01cd5f08151e74f9929799b4cbe1b6e9e6cd24faa72ffcc6@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9b609d4392d886711e694cf40d86f770022baf42a1b1aa97e8244c87@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/caacbbba2dcc1105163f76f3dfee5fbd22e0417e0783212787086378@%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ceb16af9139ab0fea24aef935b6321581976887df7ad632e9a515dda@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ea6d2dfbefab8ebe46be18b05136b83ae53b7866f1bc60c680a2b600@%3Chdfs-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f20bb4e055d8394fc525cc7772fb84096f706389043e76220c8a29a4@%3Chdfs-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cuser.flink.apache.org%3E'}]
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:28:12Z', 'nvd_published_at': None}
1.4.0
GHSA-fxp8-7h5w-h235
2021-08-18T22:27:14Z
2019-11-12T22:58:11Z
null
['CVE-2019-13234']
XSS in search engine
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the search engine.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13234'}, {'type': 'WEB', 'url': 'https://aetsu.github.io/OpenCms'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:29:42Z', 'nvd_published_at': None}
1.4.0
GHSA-6r58-4xgr-gm6m
2023-09-20T09:57:17Z
2019-11-12T23:01:59Z
null
['CVE-2019-12617']
SilverStripe Priviledge escalation through cache pollution
In SilverStripe through 4.3.3, there is access escalation for CMS users with limited access through permission cache pollution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12617'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/blog/tag/release'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2019-12617'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:50:54Z', 'nvd_published_at': None}
1.4.0
GHSA-mr6r-82x4-f4jj
2021-08-18T22:40:49Z
2019-11-20T01:34:50Z
null
['CVE-2019-10764']
Timing attacks might allow practical recovery of the long-term private key
In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical recovery of the long-term private key.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'simplito/elliptic-php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764'}, {'type': 'WEB', 'url': 'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'}, {'type': 'WEB', 'url': 'https://minerva.crocs.fi.muni.cz/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-SIMPLITOELLIPTICPHP-534576'}]
{'cwe_ids': ['CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:07:02Z', 'nvd_published_at': None}
1.4.0
GHSA-vrcf-g539-x6h3
2022-03-23T20:24:50Z
2019-11-20T01:37:13Z
null
['CVE-2019-17206']
Uncontrolled deserialization of a pickled object in rediswrapper allows attackers to execute arbitrary scripts
Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rediswrapper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17206'}, {'type': 'WEB', 'url': 'https://github.com/frostming/rediswrapper/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/frostming/rediswrapper/commit/748f60bafd857c24f65683426f665350e2c3f91b'}, {'type': 'PACKAGE', 'url': 'https://github.com/frostming/rediswrapper'}, {'type': 'WEB', 'url': 'https://github.com/frostming/rediswrapper/compare/v0.2.1...v0.3.0'}, {'type': 'WEB', 'url': 'https://github.com/frostming/rediswrapper/releases/tag/v0.3.0'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:20:13Z', 'nvd_published_at': None}
1.4.0
GHSA-5whq-j5qg-wjvp
2021-08-18T22:33:30Z
2019-11-18T17:16:06Z
null
['CVE-2019-12562']
Stored Cross-Site Scripting vulnerability in admin component of DotNetNuke
Cross-site scripting (XSS) is possible in DNN (formerly DotNetNuke) before 9.4.0 by remote authenticated users via the Display Name field in the admin notification function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12562'}, {'type': 'WEB', 'url': 'https://mayaseven.com/cve-2019-12562-stored-cross-site-scripting-in-dotnetnuke-dnn-version-v9-3-2/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154673/DotNetNuke-Cross-Site-Scripting.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-18T14:39:24Z', 'nvd_published_at': None}
1.4.0
GHSA-rc75-cf5c-mxvh
2021-08-18T22:08:17Z
2019-11-06T17:06:28Z
null
['CVE-2019-10755']
Use of Cryptographically Weak Pseudo-Random Number Generator in org.pac4j:pac4j-saml
The SAML identifier generated within SAML2Utils.java was found to make use of the apache commons-lang3 RandomStringUtils class which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong. This issue only affects the 3.X release of pac4j-saml.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.pac4j:pac4j-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10755'}, {'type': 'WEB', 'url': 'https://github.com/pac4j/pac4j/commit/34d5b1028a2db201ee81ec51b52a782fe073f609'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGPAC4J-467407'}]
{'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-05T19:56:04Z', 'nvd_published_at': '2019-09-23T23:15:00Z'}
1.4.0
GHSA-9ggp-4jpr-7ppj
2021-02-17T19:47:06Z
2019-11-20T01:35:53Z
2021-02-17T19:44:50Z
[]
Possible remote code execution via a remote procedure call
Withdrawn: duplicate of GHSA-pj4g-4488-wmxm ## Original Description In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'rpyc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16328'}, {'type': 'WEB', 'url': 'https://github.com/tomerfiliba/rpyc'}, {'type': 'WEB', 'url': 'https://rpyc.readthedocs.io/en/latest/docs/security.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00046.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00004.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:15:00Z', 'nvd_published_at': None}
1.4.0
GHSA-89ch-hqf9-rgp3
2019-11-15T20:11:29Z
2019-11-12T22:59:28Z
null
['CVE-2019-8121']
Using JS libraries with known security vulnerabilities
An insecure component vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. Magento 2 codebase leveraged outdated versions of JS libraries (Bootstrap, jquery, Knockout) with known security vulnerabilities.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8121'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8121.yaml'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:13:41Z', 'nvd_published_at': None}
1.4.0
GHSA-xcrg-29h7-h4cj
2022-04-19T20:14:24Z
2019-11-20T01:38:52Z
null
['CVE-2018-19277']
XXE in PHPSpreadsheet due to encoding issue
securityScan() in PHPOffice PhpSpreadsheet through 1.5.0 allows a bypass of protection mechanisms for XXE via UTF-7 encoding in a .xlsx file
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpoffice/phpspreadsheet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19277'}, {'type': 'WEB', 'url': 'https://github.com/MewesK/TwigSpreadsheetBundle/issues/18'}, {'type': 'WEB', 'url': 'https://github.com/PHPOffice/PhpSpreadsheet/issues/771'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPOffice/PhpSpreadsheet'}, {'type': 'WEB', 'url': 'https://www.bishopfox.com/news/2018/11/phpoffice-versions/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-contrib-2021-043'}]
{'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:40:52Z', 'nvd_published_at': '2018-11-14T11:29:00Z'}
1.4.0
GHSA-2598-2f59-rmhq
2021-08-18T22:10:20Z
2019-11-08T17:05:17Z
null
['CVE-2019-10749']
SQL Injection in sequelize
Versions of `sequelize` prior to 3.35.1 are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the Postgres dialect, which may allow attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation Upgrade to version 3.35.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.35.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10749'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1017'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-07T23:29:06Z', 'nvd_published_at': None}
1.4.0
GHSA-wmx6-vxcf-c3gr
2021-01-08T20:11:31Z
2019-11-15T23:10:19Z
null
['CVE-2019-16761']
Validation Bypass in slp-validate
Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus. ## Recommendation Upgrade to version 1.0.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'slp-validate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}]
[{'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-wmx6-vxcf-c3gr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16761'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wmx6-vxcf-c3gr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1422'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:49:38Z', 'nvd_published_at': None}
1.4.0
GHSA-h7qw-mxrm-c6h2
2021-08-18T22:35:44Z
2019-11-20T01:33:05Z
null
['CVE-2016-6485']
Unauthenticated crypto and weak IV in Magento\Framework\Encryption
The __construct function in Framework/Encryption/Crypt.php in Magento 2 uses the PHP rand function to generate a random number for the initialization vector, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by guessing the value.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6485'}, {'type': 'WEB', 'url': 'https://github.com/magento/magento2/pull/15017'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2016-6485.yaml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/07/19/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/07/27/14'}]
{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T01:07:44Z', 'nvd_published_at': None}
1.4.0
GHSA-7qqr-3pj3-q2f5
2021-08-18T22:25:15Z
2019-11-12T22:58:21Z
null
['CVE-2019-13236']
XSS issues in the management interface
In system/workplace/ in Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple Reflected and Stored XSS issues in the management interface.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13236'}, {'type': 'WEB', 'url': 'https://aetsu.github.io/OpenCms'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'}, {'type': 'WEB', 'url': 'https://twitter.com/aetsu/status/1152096227938459648'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154283/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:28:30Z', 'nvd_published_at': None}
1.4.0
GHSA-pgwj-prpq-jpc2
2023-09-21T18:19:26Z
2019-11-18T17:27:31Z
null
['CVE-2019-10910']
Symfony Service IDs Allow Injection
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, when service ids allow user input, this could allow for SQL Injection and remote code execution. This is related to symfony/dependency-injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/dependency-injection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/dependency-injection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/dependency-injection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/dependency-injection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/dependency-injection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/proxy-manager-bridge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/proxy-manager-bridge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/proxy-manager-bridge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/proxy-manager-bridge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/proxy-manager-bridge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10910'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/d2fb5893923292a1da7985f0b56960b5bb10737b'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/dependency-injection/CVE-2019-10910.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/proxy-manager-bridge/CVE-2019-10910.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10910.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-10910-check-service-ids-are-valid'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-10910'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_19_19'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-18T14:06:00Z', 'nvd_published_at': '2019-05-16T22:29:00Z'}
1.4.0
GHSA-3q5x-7mxp-rp6j
2021-08-18T22:23:57Z
2019-11-12T22:59:32Z
null
['CVE-2019-8135']
Remote code execution via vulnerable Symphony dependecy injection
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. Dependency injection through Symphony framework allows service identifiers to be derived from user controlled data, which can lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8135'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8135.yaml'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:13:36Z', 'nvd_published_at': None}
1.4.0
GHSA-cw6w-q88j-6mqf
2021-06-15T17:21:24Z
2019-11-08T17:12:59Z
null
['CVE-2019-12419']
Potential session hijack in Apache CXF
Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12419'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r861eb1a9e0250e9150215b17f0263edf62becd5e20fc96251cff59f6@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re7593a274ee0a85d304d5d42c66fc0081c94d7f22bc96a1084d43b80@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree5fc719e330f82ae38a2b0050c91f18ed5b878312dc0b9e0b9815be@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2019-12419.txt.asc'}]
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-07T23:18:50Z', 'nvd_published_at': '2019-11-06T21:15:00Z'}
1.4.0
GHSA-89r3-rcpj-h7w6
2023-03-06T20:46:38Z
2019-11-18T17:19:03Z
null
['CVE-2019-0207']
Path traversal attack on Windows platforms
Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0207'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/765be3606d865de513f6df9288842c3cf58b09a987c617a535f2b99d@%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3E'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-18T14:18:47Z', 'nvd_published_at': '2019-09-16T17:15:00Z'}
1.4.0
GHSA-36hf-6hp2-9g4c
2022-04-19T20:07:03Z
2019-11-12T22:58:14Z
null
['CVE-2019-13237']
Local file inclusion allows unauthorized access to internal resources in Alkacon OpenCms
In Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple resources vulnerable to Local File Inclusion that allow an attacker to access server resources: clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13237'}, {'type': 'WEB', 'url': 'https://aetsu.github.io/OpenCms'}, {'type': 'PACKAGE', 'url': 'https://github.com/alkacon/opencms-core'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.html'}]
{'cwe_ids': ['CWE-200', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:29:08Z', 'nvd_published_at': '2019-08-27T12:15:00Z'}
1.4.0
GHSA-gjmw-vf9h-g25v
2023-09-14T14:55:23Z
2019-11-13T00:32:38Z
null
['CVE-2019-17531']
jackson-databind polymorphic typing issue
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 prior to 2.9.10.1, 2.8.11.5, and 2.6.7.3. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.8.11.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17531'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2498'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/b5a304a98590b6bb766134f9261e6566dcbbb6d0'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4192'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0160'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0161'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0164'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0445'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b3c90d38f99db546de60fea65f99a924d540fae2285f014b79606ca5@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/12/msg00013.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191024-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-13T00:30:58Z', 'nvd_published_at': '2019-10-12T21:15:00Z'}
1.4.0
GHSA-m553-9wmx-533h
2022-11-17T20:00:22Z
2019-11-08T20:05:31Z
null
['CVE-2019-16197']
Cross-site scripting in Dolibarr
In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16197'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T13:02:38Z', 'nvd_published_at': '2019-09-16T13:15:00Z'}
1.4.0
GHSA-6g88-vr3v-76mf
2021-08-18T22:35:10Z
2019-11-20T01:31:31Z
null
['CVE-2019-19010']
Eval injection in Supybot/Limnoria
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'limnoria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2019.11.09'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19010'}, {'type': 'WEB', 'url': 'https://github.com/ProgVal/Limnoria/commit/3848ae78de45b35c029cc333963d436b9d2f0a35'}, {'type': 'WEB', 'url': 'https://github.com/ProgVal/Limnoria/wiki/math-eval-vulnerability'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/54CQM2TEXRADLE77VOMCPHL5PBHR3ZWJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5P2AGND54UIJV3WHOYO2YINIXSDGAAPO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRNOUHFEN75QAIKT4Y3HDN3TT5LSIWN2/'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-18T18:01:34Z', 'nvd_published_at': None}
1.4.0
GHSA-89mq-4x47-5v83
2022-01-04T19:51:20Z
2019-11-20T15:29:43Z
null
['CVE-2019-10768']
Prototype Pollution in angular
Versions of `angular ` prior to 1.7.9 are vulnerable to prototype pollution. The deprecated API function `merge()` does not restrict the modification of an Object's prototype in the , which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation Upgrade to version 1.7.9 or later. The function was already deprecated and upgrades are not expected to break functionality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10768'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/pull/16913'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/commit/add78e62004e80bb1e16ab2dfe224afa8e513bc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/angular.js'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANGULAR-534884'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1343'}]
{'cwe_ids': ['CWE-1321', 'CWE-20', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-20T00:51:05Z', 'nvd_published_at': '2019-11-19T21:15:00Z'}
1.4.0
GHSA-427g-2r83-3ccm
2021-07-28T15:37:48Z
2019-11-12T22:59:24Z
null
['CVE-2019-8126']
Information disclosure through processing of external XML entities
An XML entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can craft document type definition for an XML representing XML layout. The crafted document type definition and XML layout allow processing of external entities which can lead to information disclosure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8126'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:13:59Z', 'nvd_published_at': '2019-11-05T23:15:00Z'}
1.4.0
GHSA-jqwc-jm56-wcwj
2021-05-11T16:19:11Z
2019-11-08T17:07:42Z
null
['CVE-2018-21030']
Cross-site scripting in Jupyter Notebook
Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21030'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/pull/3341'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/releases/tag/5.5.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-07T23:25:31Z', 'nvd_published_at': '2019-10-31T15:15:00Z'}
1.4.0
GHSA-2p6p-v69p-9mm9
2021-08-18T22:26:42Z
2019-11-12T22:58:16Z
null
['CVE-2019-13235']
XSS in login form
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13235'}, {'type': 'WEB', 'url': 'https://aetsu.github.io/OpenCms'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:28:41Z', 'nvd_published_at': None}
1.4.0
GHSA-xm6j-x342-gwq9
2021-07-27T22:02:46Z
2019-11-12T23:01:05Z
null
['CVE-2019-16409']
Unpublished files are exposed publicly
In the Versioned Files module through 2.0.3 for SilverStripe 3.x, unpublished versions of files are publicly exposed to anyone who can guess their URL. This guess could be highly informed by a basic understanding of the symbiote/silverstripe-versionedfiles source code. (Users who upgrade from SilverStripe 3.x to 4.x and had Versioned Files installed have no further need for this module, because the 4.x release has built-in versioning. However, nothing in the upgrade process automates the destruction of these insecure artefacts, nor alerts the user to the criticality of destruction.)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-versionedfiles'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16409'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework'}, {'type': 'WEB', 'url': 'https://github.com/symbiote/silverstripe-versionedfiles'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2019-16409'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:54:36Z', 'nvd_published_at': '2019-09-26T16:15:00Z'}
1.4.0
GHSA-jvx5-rm6q-gx7p
2021-08-18T22:29:09Z
2019-11-12T23:01:50Z
null
['CVE-2019-12245']
Lack of access control on upoaded files
SilverStripe through 4.3.3 has incorrect access control for protected files uploaded via Upload::loadIntoFile(). An attacker may be able to guess a filename in silverstripe/assets via the AssetControlExtension.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12245'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2019-12245'}]
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:50:39Z', 'nvd_published_at': None}
1.4.0
GHSA-w7r7-r8r9-vrg2
2021-08-18T22:28:15Z
2019-11-12T23:01:39Z
null
['CVE-2019-12203']
Session fixation in change password form
SilverStripe through 4.3.3 allows session fixation in the "change password" form.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12203'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/blob/4/docs/en/04_Changelogs/4.4.4.md#444'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2019-12203'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:50:24Z', 'nvd_published_at': None}
1.4.0
GHSA-q3p4-gw7r-wqjc
2023-08-30T22:38:05Z
2019-11-22T13:45:22Z
null
['CVE-2019-12417']
Apache Airflow vulnerable to XSS and local file disclosure
A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. This also presented a Local File Disclosure vulnerability to any file readable by the webserver process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12417'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f3aa5ff9c7cdb5424b6463c9013f6cf5db83d26c66ea77130cbbe1bc@%3Cusers.airflow.apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-21T04:09:18Z', 'nvd_published_at': None}
1.4.0
GHSA-62fx-3v4f-mwxm
2021-08-18T22:23:23Z
2019-11-12T22:59:40Z
null
['CVE-2019-8133']
Bypass of sitemp access restrictions
A security bypass vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. A user with privileges to generate sitemaps can bypass configuration that restricts directory access. The bypass allows overwrite of a subset of configuration files which can lead to denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8133'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8133.yaml'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:13:08Z', 'nvd_published_at': None}
1.4.0
GHSA-8vh8-vc28-m2hf
2022-02-11T21:12:59Z
2019-11-20T01:33:54Z
null
['CVE-2019-10212']
Potential to access user credentials from the log files when debug logging enabled
A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10212'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0727'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10212'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0017/'}]
{'cwe_ids': ['CWE-532'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T02:49:57Z', 'nvd_published_at': '2019-10-02T19:15:00Z'}
1.4.0
GHSA-58p8-9g59-q2hr
2021-06-15T17:20:53Z
2019-11-08T17:15:11Z
null
['CVE-2019-12406']
Potential DOS attack due to unrestricted attachment count in messages
Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property "attachment-max-count".
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12406'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r92238967ba2783d3ab5a483f2e17f5fdaa8ace98990f69f9e8e15de0@%3Cissues.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rabc395b38acb7f2465bfbf0bc16d6e1e95720c89bea87abe8808eeea@%3Cissues.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2a6dab1f781f55326543c56dc29ea677759439ddfeba920c83037e6@%3Cissues.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca465c9d1e1969281338522b76701c85a07abd045c494261137236e0@%3Cissues.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2019-12406.txt.asc'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-07T23:18:17Z', 'nvd_published_at': '2019-11-06T21:15:00Z'}
1.4.0
GHSA-xv69-f7x5-r4qw
2023-09-06T13:45:11Z
2019-11-12T22:59:43Z
null
['CVE-2019-8145']
Magento Cross-Site Scripting via Attribute Set Name
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code into the attribute set name when listing the products.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8145'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8145.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:12:58Z', 'nvd_published_at': None}
1.4.0
GHSA-c3gv-9cxf-6f57
2023-08-25T21:37:28Z
2019-11-05T23:58:25Z
null
['CVE-2019-15587']
Loofah Allows Cross-site Scripting
In the Loofah gem for Ruby through v2.3.0, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15587'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/issues/171'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/commit/0c6617af440879ce97440f6eb6c58636456dc8ec'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/709009'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2019-15587.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4WK2UG7ORKRQOJ6E4XJ2NVIHYJES6BYZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMCWPLYPNIWYAY443IZZJ4IHBBLIHBP5/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191122-0003/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4498-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4554'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-10-24T20:44:29Z', 'nvd_published_at': '2019-10-22T21:15:00Z'}
1.4.0
GHSA-6268-v434-45m5
2021-08-17T22:39:50Z
2019-11-08T20:06:08Z
null
['CVE-2019-16126']
Cross-site Scripting in Grav
Grav through 1.6.15 allows (Stored) Cross-Site Scripting due to JavaScript execution in SVG images.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0-beta.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.0-beta.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16126'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/issues/2657'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T12:48:38Z', 'nvd_published_at': '2019-09-09T02:15:00Z'}
1.4.0
GHSA-pqm6-cgwr-x6pf
2021-08-18T22:14:37Z
2019-11-08T20:06:46Z
null
['CVE-2019-3465']
Signature validation bypass in XmlSecLibs
Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'robrichards/xmlseclibs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'robrichards/xmlseclibs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3465'}, {'type': 'WEB', 'url': 'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/11/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KID7C4AZPYYIZQIPSLANP4R2RQR6YK3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AB34ILMJ67CUROBOR6YPKB46VHXLOAJ4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBKVDUZ7G5ZOUO4BFJWLNJ6VOKBQJX5U/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BNFMY5RRLU63P25HEBVDO5KAVI7TX7JV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ESKJTWLE7QZBQ3EKMYXKMBQG3JDEJWM6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBE2SJSXG7J4XYLJ2H6HC2VPPOG2OMUN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAWOVYLZKYDCQBLQEJCFAAD3KQTBPHXE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCSR3V6LNWJAD37VQB6M2K7P4RQSCVFG/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBSSRV5Q7JFCYO46A3EN624UZ4KXFQ2M/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Nov/8'}, {'type': 'WEB', 'url': 'https://simplesamlphp.org/security/201911-01'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4560'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2019-09'}]
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-08T17:45:46Z', 'nvd_published_at': None}
1.4.0
GHSA-fmmc-742q-jg75
2023-09-14T14:55:20Z
2019-11-13T00:32:27Z
null
['CVE-2019-16943']
jackson-databind polymorphic typing issue
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 prior to 2.9.10.1, 2.8.11.5, and 2.6.7.3. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.8.11.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16943'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2478'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/328a0f833daf6baa443ac3b37c818a0204714b0b'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/bc67eb11a7cf57561f861ff16f879f1fceb5779f'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0160'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0161'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0164'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0445'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5ec8d8d485c2c8ac55ea425f4cd96596ef37312532712639712ebcdd@%3Ccommits.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6788e4c991f75b89d290ad06b463fcd30bcae99fee610345a35b7bc6@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Oct/6'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191017-0006/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4542'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-13T00:30:39Z', 'nvd_published_at': '2019-10-01T17:15:00Z'}
1.4.0
GHSA-vvwv-h69m-wg6f
2023-09-11T13:38:04Z
2019-11-20T01:39:57Z
null
['CVE-2019-12331']
XXE in PHPSpreadsheet due to incomplete fix for previous encoding issue
PHPOffice PhpSpreadsheet before 1.8.0 has an XXE issue. The XmlScanner decodes the sheet1.xml from an .xlsx to utf-8 if something else than UTF-8 is declared in the header. This was a security measurement to prevent CVE-2018-19277 but the fix is not sufficient. By double-encoding the the xml payload to utf-7 it is possible to bypass the check for the string ?<!ENTITY? and thus allowing for an xml external entity processing (XXE) attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpoffice/phpspreadsheet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12331'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPOffice/PhpSpreadsheet'}, {'type': 'WEB', 'url': 'https://github.com/PHPOffice/PhpSpreadsheet/blob/master/CHANGELOG.md#180---2019-07-01'}, {'type': 'WEB', 'url': 'https://github.com/PHPOffice/PhpSpreadsheet/releases/tag/1.8.0'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/security-advisories/usd-2019-0046/'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:41:04Z', 'nvd_published_at': None}
1.4.0
GHSA-x3j8-g4v9-67jq
2021-01-08T00:47:47Z
2019-02-18T23:56:51Z
null
['CVE-2016-10619']
Downloads Resources over HTTP in pennyworth
Affected versions of `pennyworth` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'pennyworth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10619'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x3j8-g4v9-67jq'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/213'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:55Z', 'nvd_published_at': None}
1.4.0
GHSA-h2r4-4xgf-3865
2021-01-08T18:44:26Z
2019-02-18T23:35:32Z
null
['CVE-2016-10567']
Downloads Resources over HTTP in product-monitor
Affected versions of `product-monitor` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `product-monitor`. ## Recommendation Update to versions 2.2.5 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'product-monitor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10567'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h2r4-4xgf-3865'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/171'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:29Z', 'nvd_published_at': None}
1.4.0
GHSA-wh4h-v3f2-r2pp
2023-09-05T18:00:56Z
2019-02-12T15:36:37Z
null
['CVE-2019-6975']
Uncontrolled Memory Consumption in Django
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the `django.utils.numberformat.format()` function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.utils.numberformat.format']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.19'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.utils.numberformat.format']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.utils.numberformat.format']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6975'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/0bbb560183fabf0533289700845dafa94951f227'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/1f42f82566c9d2d73aff1c42790d6b1b243f7676'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/40cd19055773705301c3428ed5e08a036d2091f3'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/WTwEAprR0IQ'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Jul/10'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3890-1/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227084713/http://www.securityfocus.com/bid/106964'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4476'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/feb/11/security-releases/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2019/02/11/1'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:35Z', 'nvd_published_at': None}
1.4.0
GHSA-hjhr-r3gq-qvp6
2020-08-31T18:10:37Z
2019-02-18T23:39:44Z
null
['CVE-2016-10535']
Timing Attack in csrf-lite
Affected versions of `csrf-lite` are vulnerable to timing attacks as a result of testing CSRF tokens via a fail-early comparison instead of a constant-time comparison. Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences. Under favorable network conditions, an attacker can exploit this to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present. ## Recommendation Update to version 0.1.2 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'csrf-lite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10535'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/csrf-lite/pull/1'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hjhr-r3gq-qvp6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/94'}]
{'cwe_ids': ['CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:36Z', 'nvd_published_at': None}
1.4.0
GHSA-cr79-9pwf-r6f5
2021-09-16T20:42:47Z
2019-02-18T23:34:24Z
null
['CVE-2016-10591']
Downloads Resources over HTTP in prince
Affected versions of `prince` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `prince`. ## Recommendation Update to version 1.4.6 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'prince'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10591'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cr79-9pwf-r6f5'}, {'type': 'PACKAGE', 'url': 'https://github.com/rse/node-prince'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/185'}]
{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:46Z', 'nvd_published_at': None}
1.4.0
GHSA-87g3-x896-w798
2021-01-08T19:11:36Z
2019-02-18T23:56:53Z
null
['CVE-2016-10620']
Downloads Resources over HTTP in atom-node-module-installer
Affected versions of `atom-node-module-installer` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `atom-node-module-installer`. ## Recommendation No patch is currently available for this vulnerability, and the package has not been updated since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'atom-node-module-installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10620'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-87g3-x896-w798'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/216'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:42Z', 'nvd_published_at': None}
1.4.0
GHSA-qhm8-m2c4-9mw7
2021-01-08T01:58:31Z
2019-02-18T23:45:11Z
null
['CVE-2016-10656']
Downloads Resources over HTTP in qbs
Affected versions of `qbs` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `qbs`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'qbs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10656'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qhm8-m2c4-9mw7'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/266'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:59Z', 'nvd_published_at': None}
1.4.0
GHSA-rj38-87f3-93p6
2021-01-07T22:31:53Z
2019-02-18T23:42:27Z
null
['CVE-2016-10674']
Downloads Resources over HTTP in limbus-buildgen
Affected versions of `limbus-buildgen` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `limbus-buildgen`. ## Recommendation Update to version 0.1.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'limbus-buildgen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10674'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rj38-87f3-93p6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/276'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:06Z', 'nvd_published_at': None}
1.4.0
GHSA-7r2x-3qcm-8vfw
2023-09-13T22:21:26Z
2019-02-18T23:44:36Z
null
['CVE-2016-10665']
herbivore downloads Resources over HTTP
Affected versions of `herbivore` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `herbivore`. ## Recommendation The module author has rewritten much of the package, and in that process, patched the vulnerability, but has not published any of the new code to npm. In order to get an updated version, it is necessary to install the package from github. This can be done using the following command: ``` npm i samatt/herbivore ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'herbivore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10665'}, {'type': 'WEB', 'url': 'https://github.com/samatt/Herbivore/commit/0a041defc3463e99948e5d2064aef54b2128c5a3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7r2x-3qcm-8vfw'}, {'type': 'WEB', 'url': 'https://github.com/samatt/herbivore'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/258'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:24Z', 'nvd_published_at': None}
1.4.0
GHSA-5rm3-qhxf-rh3r
2021-01-08T19:48:25Z
2019-02-18T23:45:10Z
null
['CVE-2016-10657']
Downloads Resources over HTTP in co-cli-installer
Affected versions of `co-cli-installer` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `co-cli-installer`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'co-cli-installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10657'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5rm3-qhxf-rh3r'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/268'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:19Z', 'nvd_published_at': None}