schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringclasses
11 values
aliases
stringlengths
2
20
summary
stringlengths
4
172
details
stringlengths
47
3.95k
severity
stringlengths
2
79
affected
stringlengths
76
3.32k
references
stringlengths
82
11.3k
database_specific
stringlengths
131
190
1.4.0
GHSA-6jf5-rmhv-38cw
2021-09-02T16:39:07Z
2019-04-09T19:44:03Z
null
['CVE-2019-0639']
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0639'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6jf5-rmhv-38cw'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0639'}, {'type': 'WEB', 'url': 'https://www.zerodayinitiative.com/advisories/ZDI-20-122/'}]
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:27Z', 'nvd_published_at': None}
1.4.0
GHSA-7ph8-f946-q5r7
2021-09-03T21:01:09Z
2019-04-09T19:43:54Z
null
['CVE-2019-0611']
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0592.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0611'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7ph8-f946-q5r7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0611'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:07Z', 'nvd_published_at': None}
1.4.0
GHSA-8qh8-cv77-h83g
2021-09-07T20:30:00Z
2019-04-09T19:43:46Z
null
['CVE-2019-0769']
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0769'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8qh8-cv77-h83g'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0769'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:24Z', 'nvd_published_at': None}
1.4.0
GHSA-c6fm-rgw4-8q73
2022-09-17T00:56:18Z
2019-04-08T15:18:57Z
null
['CVE-2018-12679']
CoAPthon3 vulnerable to Deserialization of Untrusted Data
The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, example collect CoAP server and client) when they receive crafted CoAP messages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'CoAPthon3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12679'}, {'type': 'WEB', 'url': 'https://github.com/Tanganelli/CoAPthon3/issues/16'}, {'type': 'PACKAGE', 'url': 'https://github.com/Tanganelli/CoAPthon3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c6fm-rgw4-8q73'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:19Z', 'nvd_published_at': None}
1.4.0
GHSA-qx2v-j445-g354
2021-08-03T21:02:26Z
2019-04-30T15:37:34Z
null
['CVE-2018-7577']
Improper Input Validation in Google TensorFlow
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow before 1.7.1, could result in a crash or read from other parts of process memory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7577'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-005.md'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-04-30T15:15:19Z', 'nvd_published_at': '2019-04-24T17:29:00Z'}
1.4.0
GHSA-887w-45rq-vxgf
2023-09-01T09:50:01Z
2019-04-16T15:50:41Z
null
['CVE-2019-7164']
SQLAlchemy vulnerable to SQL Injection via order_by parameter
SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'SQLAlchemy'}, 'ecosystem_specific': {'affected_functions': ['sqlalchemy.dialects.postgresql.base.PGDDLCompiler.visit_create_index', 'sqlalchemy.dialects.postgresql.base.PGDDLCompiler.visit_exclude_constraint', 'sqlalchemy.orm.session.Session.execute', 'sqlalchemy.sql.compiler.SQLCompiler.visit_textual_label_reference', 'sqlalchemy.sql.compiler.SQLCompiler.visit_function', 'sqlalchemy.sql.compiler.DDLCompiler.define_constraint_cascades', 'sqlalchemy.sql.compiler.DDLCompiler.define_constraint_deferrability', 'sqlalchemy.sql.compiler.IdentifierPreparer.validate_sql_phrase', 'sqlalchemy.sql.elements._document_text_coercion', 'sqlalchemy.sql.elements._expression_literal_as_text', 'sqlalchemy.sql.elements._literal_as', 'sqlalchemy.sql.elements._interpret_as_column_or_from', 'sqlalchemy.sql.selectable._interpret_as_from', 'sqlalchemy.sql.selectable.HasSuffixes._setup_suffixes']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7164'}, {'type': 'WEB', 'url': 'https://github.com/sqlalchemy/sqlalchemy/issues/4481'}, {'type': 'WEB', 'url': 'https://github.com/sqlalchemy/sqlalchemy/commit/30307c4616ad67c01ddae2e1e8e34fabf6028414'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0981'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0984'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-887w-45rq-vxgf'}, {'type': 'PACKAGE', 'url': 'https://github.com/sqlalchemy/sqlalchemy'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00005.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:54Z', 'nvd_published_at': '2019-02-20T00:29:00Z'}
1.4.0
GHSA-r28m-g6j9-r2h5
2021-04-23T20:21:47Z
2019-04-23T16:07:18Z
null
['CVE-2019-10246']
Information Exposure vulnerability in Eclipse Jetty
In Eclipse Jetty version 9.2.27, 9.3.26, and 9.4.16, the server running on Windows is vulnerable to exposure of the fully qualified Base Resource directory name on Windows to a remote client when it is configured for showing a Listing of directory contents. This information reveal is restricted to only the content in the configured base resource directories.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.2.0'}, {'fixed': '9.2.28.v20190418'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.27.v20190403'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.27.v20190418'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.3.26.v20190403'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.17.v20190418'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.16.v20190411'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10246'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546576'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190509-0003/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]
{'cwe_ids': ['CWE-200', 'CWE-213'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-04-23T16:03:54Z', 'nvd_published_at': '2019-04-22T20:29:00Z'}
1.4.0
GHSA-vqqv-v9m2-48p2
2023-08-25T23:39:10Z
2019-04-04T16:28:47Z
null
['CVE-2019-10842']
Bootstrap-sass contains code execution backdoor
Arbitrary code execution (via backdoor code) was discovered in bootstrap-sass 3.2.0.3, when downloaded from rubygems.org. An unauthenticated attacker can craft the ___cfduid cookie value with base64 arbitrary code to be executed via eval(), which can be leveraged to execute arbitrary code on the target system. Note that there are three underscore characters in the cookie name. This is unrelated to the __cfduid cookie that is legitimately used by Cloudflare.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'bootstrap-sass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0.3'}, {'fixed': '3.2.0.4'}]}], 'versions': ['3.2.0.3']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10842'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap-sass/issues/1195'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2019-10842.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap-sass'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/malicious-remote-code-execution-backdoor-discovered-in-the-popular-bootstrap-sass-ruby-gem/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-BOOTSTRAPSASS-174093'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:14Z', 'nvd_published_at': None}
1.4.0
GHSA-jhx3-2w5x-x39x
2022-09-17T00:21:19Z
2019-04-09T19:43:38Z
null
['CVE-2019-0746']
Microsoft.ChakraCore vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge, aka 'Scripting Engine Information Disclosure Vulnerability'.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0746'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhx3-2w5x-x39x'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0746'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:36Z', 'nvd_published_at': None}
1.4.0
GHSA-fvpg-qx3g-7mp7
2021-09-10T19:58:26Z
2019-04-09T19:43:29Z
null
['CVE-2019-0771']
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0773, CVE-2019-0783.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0771'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fvpg-qx3g-7mp7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0771'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:23Z', 'nvd_published_at': None}
1.4.0
GHSA-pjpj-f6r8-56rm
2021-09-16T18:14:38Z
2019-04-09T19:43:59Z
null
['CVE-2019-0609']
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0609'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pjpj-f6r8-56rm'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0609'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:29Z', 'nvd_published_at': None}
1.4.0
GHSA-gm29-35c7-8cfw
2020-08-31T18:43:56Z
2019-04-08T15:18:38Z
null
['CVE-2019-5422']
Cross-Site Scripting in buttle
All versions of `buttle` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'buttle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5422'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/331032'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/331110'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gm29-35c7-8cfw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1009'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/667'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:39Z', 'nvd_published_at': None}
1.4.0
GHSA-926q-wxr6-3crq
2021-09-07T20:36:32Z
2019-04-09T19:47:14Z
null
['CVE-2019-10904']
Moderate severity vulnerability that affects roundup
Roundup 1.6 allows XSS via the URI because frontends/roundup.cgi and roundup/cgi/wsgi_handler.py mishandle 404 errors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'roundup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10904'}, {'type': 'WEB', 'url': 'https://github.com/python/bugs.python.org/issues/34'}, {'type': 'WEB', 'url': 'https://bugs.python.org/issue36391'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-926q-wxr6-3crq'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/04/msg00009.html'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2019/04/05/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/07/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:04Z', 'nvd_published_at': None}
1.4.0
GHSA-pffw-p2q5-w6vh
2022-09-17T00:13:09Z
2019-04-08T16:23:36Z
null
['CVE-2019-0225']
Improper Limitation of a Pathname ('Path Traversal') in org.apache.jspwiki:jspwiki-war
A specially crafted url could be used to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, which could be used by an attacker to obtain registered users' details.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0225'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pffw-p2q5-w6vh'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0225'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/03ddbcb1d6322e04734e65805a147a32bcfdb71b8fc5821fb046ba8d@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4f19fdbd8b9c4caf6137a459d723f4ec60379b033ed69277eb4e0af9@%3Cuser.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6251c06cb11e0b495066be73856592dbd7ed712487ef283d10972831@%3Cdev.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/03/26/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107627'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:01Z', 'nvd_published_at': None}
1.4.0
GHSA-8p7v-2jvj-v54r
2023-08-30T23:07:15Z
2019-04-12T20:42:25Z
null
['CVE-2019-0216']
Apache Airflow vulnerable to Stored XSS
A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0216'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8p7v-2jvj-v54r'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2de387213d45bc626d27554a1bde7b8c67d08720901f82a50b6f4231@%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227081055/http://www.securityfocus.com/bid/107869'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/10/6'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:11Z', 'nvd_published_at': None}
1.4.0
GHSA-fvx3-g627-phm2
2023-09-05T23:27:35Z
2019-04-18T14:27:42Z
null
['CVE-2019-10686']
Server-Side Request Forgery (SSRF) in com.ctrip.framework.apollo:apollo
An SSRF vulnerability was found in an API from Ctrip Apollo through 1.4.0-SNAPSHOT. An attacker may use it to do an intranet port scan or raise a GET request via `/system-info/health` because the `%23` substring is mishandled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.ctrip.framework.apollo:apollo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10686'}, {'type': 'WEB', 'url': 'https://github.com/ctripcorp/apollo/issues/2103'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fvx3-g627-phm2'}, {'type': 'PACKAGE', 'url': 'https://github.com/ctripcorp/apollo'}]
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:29Z', 'nvd_published_at': None}
1.4.0
GHSA-wv67-q8rr-grjp
2022-10-06T17:19:37Z
2019-04-23T15:59:10Z
2019-04-26T14:50:56Z
['CVE-2019-5428']
Duplicate Advisory: Prototype Pollution in jquery
## Duplicate Advisory This advisory is a duplicate of [GHSA-6c3j-c64m-qhgq](https://github.com/advisories/GHSA-6c3j-c64m-qhgq). This link is maintained to preserve external references. ## Original Description Versions of `jquery` prior to 3.4.0 are vulnerable to Prototype Pollution. The extend() method allows an attacker to modify the prototype for `Object` causing changes in properties that will exist on all objects. ## Recommendation Upgrade to version 3.4.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5428'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/pull/4333'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/454365'}, {'type': 'WEB', 'url': 'https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/796'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-04-23T15:57:18Z', 'nvd_published_at': None}
1.4.0
GHSA-c538-924g-99q4
2021-08-03T18:51:25Z
2019-04-24T16:06:59Z
null
['CVE-2017-12619']
Session Fixation in Apache Zeppelin
Apache Zeppelin prior to 0.7.3 was vulnerable to session fixation which allowed an attacker to hijack a valid user session. Issue was reported by "stone lone".
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zeppelin:zeppelin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12619'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff6b995a5a3ba8db4d6b14b4d9dd487e7bf2e3bdd5b375b64a25fd06@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://zeppelin.apache.org/releases/zeppelin-release-0.7.3.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/23/1'}]
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-04-24T16:04:01Z', 'nvd_published_at': '2019-04-23T15:29:00Z'}
1.4.0
GHSA-v2r2-7qm7-jj6v
2022-11-17T19:45:44Z
2019-04-16T15:10:59Z
null
['CVE-2019-3795']
Spring Security uses insufficiently random values
Spring Security versions 4.2.x prior to 4.2.12, 5.0.x prior to 5.0.12, and 5.1.x prior to 5.1.5 contain an insecure randomness vulnerability when using SecureRandomFactoryBean#setSeed to configure a SecureRandom instance. In order to be impacted, an honest application must provide a seed and make the resulting random material available to an attacker for inspection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3795'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v2r2-7qm7-jj6v'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/05/msg00026.html'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3795'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107802'}]
{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:26Z', 'nvd_published_at': '2019-04-09T16:29:00Z'}
1.4.0
GHSA-98f7-p5rc-jx67
2023-08-28T15:34:40Z
2019-04-09T19:44:40Z
null
['CVE-2019-11002']
Materialize-css vulnerable to Cross-site Scripting in tooltip component
All versions of `materialize-css` are vulnerable to Cross-Site Scripting. The `tooltip` component does not sufficiently sanitize user input, allowing an attacker to execute arbitrary JavaScript code if the malicious input is rendered by a user. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'materialize-css'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@materializecss/materialize'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0-alpha'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11002'}, {'type': 'WEB', 'url': 'https://github.com/Dogfalo/materialize/issues/6286'}, {'type': 'WEB', 'url': 'https://github.com/materializecss/materialize/pull/49'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dogfalo/materialize'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-98f7-p5rc-jx67'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-174148'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/818'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:50Z', 'nvd_published_at': None}
1.4.0
GHSA-74xw-82v7-hmrm
2023-08-08T12:35:08Z
2019-04-23T16:04:36Z
null
['CVE-2015-1326']
Improper Input Validation in python-dbusmock
python-dbusmock before version 0.15.1 AddTemplate() D-Bus method call or DBusTestCase.spawn_server_template() method could be tricked into executing malicious code if an attacker supplies a .pyc file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-dbusmock'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1326'}, {'type': 'WEB', 'url': 'https://github.com/martinpitt/python-dbusmock/commit/4e7d0df9093'}, {'type': 'PACKAGE', 'url': 'https://github.com/martinpitt/python-dbusmock'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-04-23T16:02:12Z', 'nvd_published_at': '2019-04-22T16:29:00Z'}
1.4.0
GHSA-38fc-9xqv-7f7q
2023-09-01T09:56:00Z
2019-04-16T15:50:39Z
null
['CVE-2019-7548']
SQLAlchemy is vulnerable to SQL Injection via group_by parameter
SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'SQLAlchemy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7548'}, {'type': 'WEB', 'url': 'https://github.com/sqlalchemy/sqlalchemy/issues/4481#issuecomment-461204518'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0981'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0984'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38fc-9xqv-7f7q'}, {'type': 'WEB', 'url': 'https://github.com/no-security/sqlalchemy_test'}, {'type': 'PACKAGE', 'url': 'https://github.com/sqlalchemy/sqlalchemy'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00005.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:34Z', 'nvd_published_at': '2019-02-06T21:29:00Z'}
1.4.0
GHSA-jpv3-g4cc-6vfx
2022-09-17T00:22:23Z
2019-04-02T15:46:42Z
null
['CVE-2019-0222']
Improper Control of Generation of Code ('Code Injection') in org.apache.activemq:activemq-client
In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.15.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0222'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jpv3-g4cc-6vfx'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/71640324661c1b6d0b6708bd4fb20170e1b979370a4b8cddc4f8d485@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7da9636557118178b1690ba0af49c8a7b7b97d925218b5774622f488@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d1e334bd71d6e68462c62c726fe6db565c7a6283302f9c1feed087fa@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190502-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://activemq.apache.org/security-advisories.data/CVE-2019-0222-announcement.txt'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/03/27/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107622'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:05Z', 'nvd_published_at': '2019-03-28T22:29:00Z'}
1.4.0
GHSA-gc52-xj6p-9pxp
2021-08-03T21:24:04Z
2019-04-30T15:37:21Z
null
['CVE-2019-3868']
Exposure of Sensitive Information to an Unauthorized Actor in Keycloak
Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user?s browser session.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3868'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3868'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108061'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-04-30T15:16:15Z', 'nvd_published_at': '2019-04-24T16:29:00Z'}
1.4.0
GHSA-3w9q-c44j-37jj
2021-08-31T21:35:30Z
2019-04-09T19:43:32Z
null
['CVE-2019-0773']
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0783.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0773'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3w9q-c44j-37jj'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0773'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:41Z', 'nvd_published_at': None}
1.4.0
GHSA-84p2-vf58-xhxv
2021-04-23T20:12:41Z
2019-04-23T16:03:18Z
null
['CVE-2019-5427']
Billion laughs attack in c3p0
c3p0 version < 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.mchange:c3p0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.5.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5427'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/509315'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFIVX6HOVNLAM7W3SUAMHYRNLCVQSAWR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-04-23T16:01:51Z', 'nvd_published_at': '2019-04-22T21:29:00Z'}
1.4.0
GHSA-8vmx-qmch-mpqg
2021-06-15T16:59:53Z
2019-04-18T14:27:35Z
null
['CVE-2019-0232']
High severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.40'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.94'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0232'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1712'}, {'type': 'WEB', 'url': 'https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/'}, {'type': 'WEB', 'url': 'https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8vmx-qmch-mpqg'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190419-0001/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/'}, {'type': 'WEB', 'url': 'https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-784'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_19_17'}, {'type': 'WEB', 'url': 'https://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/153506/Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/4'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107906'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:43Z', 'nvd_published_at': '2019-04-15T15:29:00Z'}
1.4.0
GHSA-xc67-hjx6-cgg6
2021-04-23T20:19:57Z
2019-04-23T16:07:12Z
null
['CVE-2019-10247']
Installation information leak in Eclipse Jetty
In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '9.2.28.v20190418'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.27.v20190403'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.27.v20190418'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.3.26.v20190403'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.17.v20190418'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.16.v20190411'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10247'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546577'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190509-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4949'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]
{'cwe_ids': ['CWE-200', 'CWE-213'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-04-23T16:04:31Z', 'nvd_published_at': '2019-04-22T20:29:00Z'}
1.4.0
GHSA-r53m-pfr5-7v87
2020-06-17T15:15:06Z
2019-04-18T14:50:19Z
2020-06-17T15:15:06Z
[]
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
**Withdrawn:** Duplicate of GHSA-qcxh-w3j9-58qr
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.14'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.38'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0199'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r53m-pfr5-7v87'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:06Z', 'nvd_published_at': None}
1.4.0
GHSA-rcx2-m7jp-p9wj
2023-09-05T18:21:38Z
2019-04-09T19:47:27Z
null
['CVE-2019-10856']
Jupyter Notebook open redirect vulnerability
In Jupyter Notebook before 5.7.8, an open redirect can occur via an empty netloc. This issue exists because of an incomplete fix for CVE-2019-10255.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10856'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/979e0bd15e794ceb00cc63737fcd5fd9addc4a99'}, {'type': 'WEB', 'url': 'https://blog.jupyter.org/open-redirect-vulnerability-in-jupyter-jupyterhub-adf43583f1e4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rcx2-m7jp-p9wj'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/compare/16cf97c...b8e30ea'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:28Z', 'nvd_published_at': None}
1.4.0
GHSA-fmpq-w5q6-9vf9
2021-06-10T23:43:17Z
2019-04-02T15:46:48Z
null
['CVE-2019-0224']
Moderate severity vulnerability that affects org.apache.jspwiki:jspwiki-main
In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0224'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fmpq-w5q6-9vf9'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0224'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4b4992a93d899050c1117a07c3c7fc9a175ec0672ab97065228de67@%3Cdev.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107631'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:58Z', 'nvd_published_at': None}
1.4.0
GHSA-mh33-7rrq-662w
2023-09-05T18:28:03Z
2019-04-19T16:55:10Z
null
['CVE-2019-11324']
Improper Certificate Validation in urllib3
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the `ssl_context`, `ca_certs`, or `ca_certs_dir` argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11324'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/1efadf43dc63317cd9eaa3e0fdb9e05ab07254b1'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3335'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3590'}, {'type': 'PACKAGE', 'url': 'https://github.com/urllib3/urllib3'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/compare/a6ec68a...1efadf4'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKGPJLVLVYCL4L4B4G5TIOTVK4BKPG72/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOSA2NT4DUQDBEIWE6O7KKD24XND7TE2/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/urllib3/1.24.2/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3990-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/19/1'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-04-19T16:54:21Z', 'nvd_published_at': '2019-04-18T21:29:00Z'}
1.4.0
GHSA-hj2j-77xm-mc5v
2021-09-14T17:21:42Z
2019-04-10T14:30:13Z
null
['CVE-2016-10745']
High severity vulnerability that affects Jinja2
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Jinja2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10745'}, {'type': 'WEB', 'url': 'https://github.com/pallets/jinja/commit/9b53045c34e61013dc8f09b7e52a555fa16bed16'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1022'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1237'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1260'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3964'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4062'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hj2j-77xm-mc5v'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/jinja'}, {'type': 'WEB', 'url': 'https://palletsprojects.com/blog/jinja-281-released/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4011-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4011-2/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html'}]
{'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:24Z', 'nvd_published_at': None}
1.4.0
GHSA-mw6v-crh8-8533
2023-09-01T20:02:20Z
2019-04-30T15:36:41Z
null
['CVE-2018-7575']
Integer Overflow or Wraparound in Google TensorFlow
### Issue Description Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The type of exploitation is context-dependent. The block size in meta file might contain a large int64 value which causes an integer overflow upon addition. Subsequent code using n as index may cause an out-of-bounds read. ### Impact A maliciously crafted meta checkpoint could be used to cause the TensorFlow process to perform an out of bounds read on in process memory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7575'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d107fee1e4a9a4462f01564798d345802acc2aef'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-004.md'}]
{'cwe_ids': ['CWE-190'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-04-30T15:16:08Z', 'nvd_published_at': '2019-04-24T21:29:00Z'}
1.4.0
GHSA-462w-v97r-4m45
2023-08-30T21:01:31Z
2019-04-10T14:30:24Z
null
['CVE-2019-10906']
Jinja2 sandbox escape via string formatting
In Pallets Jinja before 2.10.1, `str.format_map` allows a sandbox escape. The sandbox is used to restrict what code can be evaluated when rendering untrusted, user-provided templates. Due to the way string formatting works in Python, the `str.format_map` method could be used to escape the sandbox. This issue was previously addressed for the `str.format` method in Jinja 2.8.1, which discusses the issue in detail. However, the less-common `str.format_map` method was overlooked. This release applies the same sandboxing to both methods. If you cannot upgrade Jinja, you can override the `is_safe_attribute` method on the sandbox and explicitly disallow the `format_map` method on string objects.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Jinja2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10906'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1152'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1237'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1329'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-462w-v97r-4m45'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/09fc842ff444cd43d9d4c510756fec625ef8eb1175f14fd21de2605f@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2b52b9c8b9d6366a4f1b407a8bde6af28d9fc73fdb3b37695fd0d9ac@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/320441dccbd9a545320f5f07306d711d4bbd31ba43dc9eebcfc602df@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/46c055e173b52d599c648a98199972dbd6a89d2b4c4647b0500f2284@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/57673a78c4d5c870d3f21465c7e2946b9f8285c7c57e54c2ae552f02@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7f39f01392d320dfb48e4901db68daeece62fd60ef20955966739993@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b2380d147b508bbcb90d2cad443c159e63e12555966ab4f320ee22da@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f0c4a03418bcfe70c539c5dbaf99c04c98da13bfa1d3266f08564316@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSW3QZMFVVR7YE3UT4YRQA272TYAL5AF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCDYIS254EJMBNWOG4S5QY6AOTOR4TZU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS7IVZAJBWOHNRDMFJDIZVFCMRP6YIUQ/'}, {'type': 'WEB', 'url': 'https://palletsprojects.com/blog/jinja-2-10-1-released'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4011-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4011-2/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html'}]
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:35Z', 'nvd_published_at': '2019-04-07T00:29:00Z'}
1.4.0
GHSA-rv62-4pmj-xw6h
2023-09-05T12:34:54Z
2019-04-02T15:46:54Z
null
['CVE-2019-10255']
Open Redirect vulnerability in jupyterhub and notebook
An Open Redirect vulnerability for all browsers in Jupyter Notebook before 5.7.8 and some browsers (Chrome, Firefox) in JupyterHub before 0.9.6 allows crafted links to the login page, which will redirect to a malicious site after successful login. Servers running on a base_url prefix are not affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'jupyterhub'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10255'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/08c4c898182edbe97aadef1815cce50448f975cb'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/70fe9f0ddb3023162ece21fbb77d5564306b913b'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/d65328d4841892b412aef9015165db1eb029a8ed'}, {'type': 'WEB', 'url': 'https://blog.jupyter.org/open-redirect-vulnerability-in-jupyter-jupyterhub-adf43583f1e4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rv62-4pmj-xw6h'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/compare/05aa4b2...16cf97c'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UP5RLEES2JBBNSNLBR65XM6PCD4EMF7D/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMDPJBVXOVO6LYGAT46VZNHH6JKSCURO/'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:52Z', 'nvd_published_at': None}
1.4.0
GHSA-72p5-2r6g-fm6v
2021-06-11T14:16:33Z
2019-04-02T15:46:52Z
null
['CVE-2019-10260']
Moderate severity vulnerability that affects total.js
Total.js CMS 12.0.0 has XSS related to themes/admin/views/index.html (item.message) and themes/admin/public/ui.js (column.format).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'total.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0-13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0-12'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10260'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/cms/commit/75205f93009db3cf8c0b0f4f1fc8ab82d70da8ad'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/cms/commit/8b9d7dada998c08d172481d9f0fc0397c4b3c78d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-72p5-2r6g-fm6v'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:57Z', 'nvd_published_at': None}
1.4.0
GHSA-r8h9-hq9c-2p5c
2021-09-17T14:43:23Z
2019-04-08T15:18:54Z
null
['CVE-2019-1010260']
High severity vulnerability that affects com.github.shyiko.ktlint:ktlint-core
Using ktlint to download and execute custom rulesets can result in arbitrary code execution as the served jars can be compromised by a MITM. This attack is exploitable via Man in the Middle of the HTTP connection to the artifact servers. This vulnerability appears to have been fixed in 0.30.0 and later; after commit 5e547b287d6c260d328a2cb658dbe6b7a7ff2261.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.github.shyiko.ktlint:ktlint-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.30.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010260'}, {'type': 'WEB', 'url': 'https://github.com/shyiko/ktlint/pull/332'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r8h9-hq9c-2p5c'}, {'type': 'PACKAGE', 'url': 'https://github.com/shyiko/ktlint'}]
{'cwe_ids': ['CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:05Z', 'nvd_published_at': None}
1.4.0
GHSA-frxx-2m33-6wcr
2023-09-01T20:17:19Z
2019-04-24T16:11:30Z
null
['CVE-2018-8825']
Improper Restriction of Operations within the Bounds of a Memory Buffer in Google TensorFlow
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). Users passing a malformed or malicious version of a TFLite graph into TOCO will cause TOCO to crash or cause a buffer overflow, potentially allowing malicious code to be executed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8825'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/41335abb46f80ca644b5738550daef6136ba5476'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8badd11d875a826bd318ed439909d5c47a7fb811'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-003.md'}]
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-04-24T16:11:11Z', 'nvd_published_at': '2019-04-23T21:29:00Z'}
1.4.0
GHSA-jwqm-c9f2-2cq3
2021-12-03T14:33:13Z
2019-04-15T16:19:23Z
null
['CVE-2019-10240']
Cleartext Transmission of Sensitive Information, Inclusion of Functionality from Untrusted Control Sphere , and Download of Code Without Integrity Check in Eclipse hawkBit
Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-autoconfigure'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-starters'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-boot-starter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-update-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-boot-starter-mgmt-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-boot-starter-mgmt-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-boot-starter-dmf-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-boot-starter-ddi-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10240'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jwqm-c9f2-2cq3'}]
{'cwe_ids': ['CWE-319', 'CWE-494', 'CWE-829'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-03T14:33:13Z', 'nvd_published_at': None}
1.4.0
GHSA-qpvx-gpqm-g98j
2021-09-16T20:03:33Z
2019-04-18T14:28:03Z
null
['CVE-2019-7644']
Critical severity vulnerability that affects Auth0-WCF-Service-JWT
Auth0 Auth0-WCF-Service-JWT before 1.0.4 leaks the expected JWT signature in an error message when it cannot successfully validate the JWT signature. If this error message is presented to an attacker, they can forge an arbitrary JWT token that will be accepted by the vulnerable application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Auth0-WCF-Service-JWT'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7644'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2019-7644'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qpvx-gpqm-g98j'}]
{'cwe_ids': ['CWE-209'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:29Z', 'nvd_published_at': None}
1.4.0
GHSA-rcj2-vvjx-87pm
2021-05-11T14:57:28Z
2019-04-22T17:15:40Z
null
['CVE-2019-11404']
Missing Encryption of Sensitive Data in arrow-kt Arrow
arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by an MITM attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.arrow-kt:arrow-ank-gradle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11404'}, {'type': 'WEB', 'url': 'https://github.com/arrow-kt/ank/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/arrow-kt/arrow/issues/1310'}, {'type': 'WEB', 'url': 'https://github.com/arrow-kt/ank/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/arrow-kt/arrow/commit/74198dab522393487d5344f194dc21208ab71ae8'}, {'type': 'WEB', 'url': 'https://github.com/arrow-kt/arrow/releases/tag/0.9.0'}]
{'cwe_ids': ['CWE-311'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-04-22T17:15:03Z', 'nvd_published_at': '2019-04-22T11:29:00Z'}
1.4.0
GHSA-5xc6-fpc7-4qvg
2023-09-05T18:40:23Z
2019-04-08T15:19:01Z
null
['CVE-2018-12680']
CoAPthon DoS due to Exceptions
The `Serialize.deserialize()` method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'CoAPthon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12680'}, {'type': 'WEB', 'url': 'https://github.com/Tanganelli/CoAPthon/issues/135'}, {'type': 'PACKAGE', 'url': 'https://github.com/Tanganelli/CoAPthon'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5xc6-fpc7-4qvg'}]
{'cwe_ids': ['CWE-400', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:34Z', 'nvd_published_at': None}
1.4.0
GHSA-jfq2-rj7f-9gvf
2021-08-03T19:06:32Z
2019-04-24T16:11:27Z
null
['CVE-2018-7576']
Null pointer dereference in TensorFlow leads to exploitation
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of exploitation is: context-dependent.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7576'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-002.md'}]
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-04-24T16:11:06Z', 'nvd_published_at': None}
1.4.0
GHSA-rg3q-jxmp-pvjj
2022-09-17T00:24:09Z
2019-04-09T19:44:37Z
null
['CVE-2019-11004']
Materialize-css vulnerable to Improper Neutralization of Input During Web Page Generation
In Materialize through 1.0.0, XSS is possible via the Toast feature.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'materialize-css'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@materializecss/materialize'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0-alpha'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11004'}, {'type': 'WEB', 'url': 'https://github.com/Dogfalo/materialize/issues/6286'}, {'type': 'WEB', 'url': 'https://github.com/Dogfalo/materialize/issues/6331#issuecomment-549080183'}, {'type': 'WEB', 'url': 'https://github.com/materializecss/materialize/pull/49'}, {'type': 'WEB', 'url': 'https://github.com/samschurter/materialize/commit/3aae4cc9bb2b58c337bf25d2f04f129a2a0fa78f'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dogfalo/materialize'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rg3q-jxmp-pvjj'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:40Z', 'nvd_published_at': None}