schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringclasses 11
values | aliases
stringlengths 2
20
| summary
stringlengths 4
172
| details
stringlengths 47
3.95k
| severity
stringlengths 2
79
| affected
stringlengths 76
3.32k
| references
stringlengths 82
11.3k
| database_specific
stringlengths 131
190
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-6jf5-rmhv-38cw | 2021-09-02T16:39:07Z | 2019-04-09T19:44:03Z | null | ['CVE-2019-0639'] | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0639'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6jf5-rmhv-38cw'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0639'}, {'type': 'WEB', 'url': 'https://www.zerodayinitiative.com/advisories/ZDI-20-122/'}] | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7ph8-f946-q5r7 | 2021-09-03T21:01:09Z | 2019-04-09T19:43:54Z | null | ['CVE-2019-0611'] | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0592. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0611'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7ph8-f946-q5r7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0611'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8qh8-cv77-h83g | 2021-09-07T20:30:00Z | 2019-04-09T19:43:46Z | null | ['CVE-2019-0769'] | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0769'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8qh8-cv77-h83g'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0769'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c6fm-rgw4-8q73 | 2022-09-17T00:56:18Z | 2019-04-08T15:18:57Z | null | ['CVE-2018-12679'] | CoAPthon3 vulnerable to Deserialization of Untrusted Data | The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, example collect CoAP server and client) when they receive crafted CoAP messages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'CoAPthon3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12679'}, {'type': 'WEB', 'url': 'https://github.com/Tanganelli/CoAPthon3/issues/16'}, {'type': 'PACKAGE', 'url': 'https://github.com/Tanganelli/CoAPthon3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c6fm-rgw4-8q73'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qx2v-j445-g354 | 2021-08-03T21:02:26Z | 2019-04-30T15:37:34Z | null | ['CVE-2018-7577'] | Improper Input Validation in Google TensorFlow | Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow before 1.7.1, could result in a crash or read from other parts of process memory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7577'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-005.md'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-04-30T15:15:19Z', 'nvd_published_at': '2019-04-24T17:29:00Z'} |
1.4.0 | GHSA-887w-45rq-vxgf | 2023-09-01T09:50:01Z | 2019-04-16T15:50:41Z | null | ['CVE-2019-7164'] | SQLAlchemy vulnerable to SQL Injection via order_by parameter | SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'SQLAlchemy'}, 'ecosystem_specific': {'affected_functions': ['sqlalchemy.dialects.postgresql.base.PGDDLCompiler.visit_create_index', 'sqlalchemy.dialects.postgresql.base.PGDDLCompiler.visit_exclude_constraint', 'sqlalchemy.orm.session.Session.execute', 'sqlalchemy.sql.compiler.SQLCompiler.visit_textual_label_reference', 'sqlalchemy.sql.compiler.SQLCompiler.visit_function', 'sqlalchemy.sql.compiler.DDLCompiler.define_constraint_cascades', 'sqlalchemy.sql.compiler.DDLCompiler.define_constraint_deferrability', 'sqlalchemy.sql.compiler.IdentifierPreparer.validate_sql_phrase', 'sqlalchemy.sql.elements._document_text_coercion', 'sqlalchemy.sql.elements._expression_literal_as_text', 'sqlalchemy.sql.elements._literal_as', 'sqlalchemy.sql.elements._interpret_as_column_or_from', 'sqlalchemy.sql.selectable._interpret_as_from', 'sqlalchemy.sql.selectable.HasSuffixes._setup_suffixes']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7164'}, {'type': 'WEB', 'url': 'https://github.com/sqlalchemy/sqlalchemy/issues/4481'}, {'type': 'WEB', 'url': 'https://github.com/sqlalchemy/sqlalchemy/commit/30307c4616ad67c01ddae2e1e8e34fabf6028414'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0981'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0984'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-887w-45rq-vxgf'}, {'type': 'PACKAGE', 'url': 'https://github.com/sqlalchemy/sqlalchemy'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00005.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:54Z', 'nvd_published_at': '2019-02-20T00:29:00Z'} |
1.4.0 | GHSA-r28m-g6j9-r2h5 | 2021-04-23T20:21:47Z | 2019-04-23T16:07:18Z | null | ['CVE-2019-10246'] | Information Exposure vulnerability in Eclipse Jetty | In Eclipse Jetty version 9.2.27, 9.3.26, and 9.4.16, the server running on Windows is vulnerable to exposure of the fully qualified Base Resource directory name on Windows to a remote client when it is configured for showing a Listing of directory contents. This information reveal is restricted to only the content in the configured base resource directories. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.2.0'}, {'fixed': '9.2.28.v20190418'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.27.v20190403'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.27.v20190418'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.3.26.v20190403'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.17.v20190418'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.16.v20190411'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10246'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546576'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190509-0003/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}] | {'cwe_ids': ['CWE-200', 'CWE-213'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-04-23T16:03:54Z', 'nvd_published_at': '2019-04-22T20:29:00Z'} |
1.4.0 | GHSA-vqqv-v9m2-48p2 | 2023-08-25T23:39:10Z | 2019-04-04T16:28:47Z | null | ['CVE-2019-10842'] | Bootstrap-sass contains code execution backdoor | Arbitrary code execution (via backdoor code) was discovered in bootstrap-sass 3.2.0.3, when downloaded from rubygems.org. An unauthenticated attacker can craft the ___cfduid cookie value with base64 arbitrary code to be executed via eval(), which can be leveraged to execute arbitrary code on the target system. Note that there are three underscore characters in the cookie name. This is unrelated to the __cfduid cookie that is legitimately used by Cloudflare. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'bootstrap-sass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0.3'}, {'fixed': '3.2.0.4'}]}], 'versions': ['3.2.0.3']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10842'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap-sass/issues/1195'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2019-10842.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap-sass'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/malicious-remote-code-execution-backdoor-discovered-in-the-popular-bootstrap-sass-ruby-gem/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-BOOTSTRAPSASS-174093'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jhx3-2w5x-x39x | 2022-09-17T00:21:19Z | 2019-04-09T19:43:38Z | null | ['CVE-2019-0746'] | Microsoft.ChakraCore vulnerable to Exposure of Sensitive Information to an Unauthorized Actor | An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge, aka 'Scripting Engine Information Disclosure Vulnerability'. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0746'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhx3-2w5x-x39x'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0746'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fvpg-qx3g-7mp7 | 2021-09-10T19:58:26Z | 2019-04-09T19:43:29Z | null | ['CVE-2019-0771'] | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0773, CVE-2019-0783. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0771'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fvpg-qx3g-7mp7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0771'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pjpj-f6r8-56rm | 2021-09-16T18:14:38Z | 2019-04-09T19:43:59Z | null | ['CVE-2019-0609'] | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0609'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pjpj-f6r8-56rm'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0609'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gm29-35c7-8cfw | 2020-08-31T18:43:56Z | 2019-04-08T15:18:38Z | null | ['CVE-2019-5422'] | Cross-Site Scripting in buttle | All versions of `buttle` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'buttle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5422'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/331032'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/331110'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gm29-35c7-8cfw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1009'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/667'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-926q-wxr6-3crq | 2021-09-07T20:36:32Z | 2019-04-09T19:47:14Z | null | ['CVE-2019-10904'] | Moderate severity vulnerability that affects roundup | Roundup 1.6 allows XSS via the URI because frontends/roundup.cgi and roundup/cgi/wsgi_handler.py mishandle 404 errors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'roundup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10904'}, {'type': 'WEB', 'url': 'https://github.com/python/bugs.python.org/issues/34'}, {'type': 'WEB', 'url': 'https://bugs.python.org/issue36391'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-926q-wxr6-3crq'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/04/msg00009.html'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2019/04/05/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/07/1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pffw-p2q5-w6vh | 2022-09-17T00:13:09Z | 2019-04-08T16:23:36Z | null | ['CVE-2019-0225'] | Improper Limitation of a Pathname ('Path Traversal') in org.apache.jspwiki:jspwiki-war | A specially crafted url could be used to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, which could be used by an attacker to obtain registered users' details. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0225'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pffw-p2q5-w6vh'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0225'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/03ddbcb1d6322e04734e65805a147a32bcfdb71b8fc5821fb046ba8d@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4f19fdbd8b9c4caf6137a459d723f4ec60379b033ed69277eb4e0af9@%3Cuser.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6251c06cb11e0b495066be73856592dbd7ed712487ef283d10972831@%3Cdev.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/03/26/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107627'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8p7v-2jvj-v54r | 2023-08-30T23:07:15Z | 2019-04-12T20:42:25Z | null | ['CVE-2019-0216'] | Apache Airflow vulnerable to Stored XSS | A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0216'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8p7v-2jvj-v54r'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2de387213d45bc626d27554a1bde7b8c67d08720901f82a50b6f4231@%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227081055/http://www.securityfocus.com/bid/107869'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/10/6'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fvx3-g627-phm2 | 2023-09-05T23:27:35Z | 2019-04-18T14:27:42Z | null | ['CVE-2019-10686'] | Server-Side Request Forgery (SSRF) in com.ctrip.framework.apollo:apollo | An SSRF vulnerability was found in an API from Ctrip Apollo through 1.4.0-SNAPSHOT. An attacker may use it to do an intranet port scan or raise a GET request via `/system-info/health` because the `%23` substring is mishandled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.ctrip.framework.apollo:apollo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10686'}, {'type': 'WEB', 'url': 'https://github.com/ctripcorp/apollo/issues/2103'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fvx3-g627-phm2'}, {'type': 'PACKAGE', 'url': 'https://github.com/ctripcorp/apollo'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wv67-q8rr-grjp | 2022-10-06T17:19:37Z | 2019-04-23T15:59:10Z | 2019-04-26T14:50:56Z | ['CVE-2019-5428'] | Duplicate Advisory: Prototype Pollution in jquery | ## Duplicate Advisory
This advisory is a duplicate of [GHSA-6c3j-c64m-qhgq](https://github.com/advisories/GHSA-6c3j-c64m-qhgq). This link is maintained to preserve external references.
## Original Description
Versions of `jquery` prior to 3.4.0 are vulnerable to Prototype Pollution. The extend() method allows an attacker to modify the prototype for `Object` causing changes in properties that will exist on all objects.
## Recommendation
Upgrade to version 3.4.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5428'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/pull/4333'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/454365'}, {'type': 'WEB', 'url': 'https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/796'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-04-23T15:57:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c538-924g-99q4 | 2021-08-03T18:51:25Z | 2019-04-24T16:06:59Z | null | ['CVE-2017-12619'] | Session Fixation in Apache Zeppelin | Apache Zeppelin prior to 0.7.3 was vulnerable to session fixation which allowed an attacker to hijack a valid user session. Issue was reported by "stone lone". | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zeppelin:zeppelin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12619'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff6b995a5a3ba8db4d6b14b4d9dd487e7bf2e3bdd5b375b64a25fd06@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://zeppelin.apache.org/releases/zeppelin-release-0.7.3.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/23/1'}] | {'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-04-24T16:04:01Z', 'nvd_published_at': '2019-04-23T15:29:00Z'} |
1.4.0 | GHSA-v2r2-7qm7-jj6v | 2022-11-17T19:45:44Z | 2019-04-16T15:10:59Z | null | ['CVE-2019-3795'] | Spring Security uses insufficiently random values | Spring Security versions 4.2.x prior to 4.2.12, 5.0.x prior to 5.0.12, and 5.1.x prior to 5.1.5 contain an insecure randomness vulnerability when using SecureRandomFactoryBean#setSeed to configure a SecureRandom instance. In order to be impacted, an honest application must provide a seed and make the resulting random material available to an attacker for inspection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3795'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v2r2-7qm7-jj6v'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/05/msg00026.html'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3795'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107802'}] | {'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:26Z', 'nvd_published_at': '2019-04-09T16:29:00Z'} |
1.4.0 | GHSA-98f7-p5rc-jx67 | 2023-08-28T15:34:40Z | 2019-04-09T19:44:40Z | null | ['CVE-2019-11002'] | Materialize-css vulnerable to Cross-site Scripting in tooltip component | All versions of `materialize-css` are vulnerable to Cross-Site Scripting. The `tooltip` component does not sufficiently sanitize user input, allowing an attacker to execute arbitrary JavaScript code if the malicious input is rendered by a user.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'materialize-css'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@materializecss/materialize'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0-alpha'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11002'}, {'type': 'WEB', 'url': 'https://github.com/Dogfalo/materialize/issues/6286'}, {'type': 'WEB', 'url': 'https://github.com/materializecss/materialize/pull/49'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dogfalo/materialize'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-98f7-p5rc-jx67'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-174148'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/818'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-74xw-82v7-hmrm | 2023-08-08T12:35:08Z | 2019-04-23T16:04:36Z | null | ['CVE-2015-1326'] | Improper Input Validation in python-dbusmock | python-dbusmock before version 0.15.1 AddTemplate() D-Bus method call or DBusTestCase.spawn_server_template() method could be tricked into executing malicious code if an attacker supplies a .pyc file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-dbusmock'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1326'}, {'type': 'WEB', 'url': 'https://github.com/martinpitt/python-dbusmock/commit/4e7d0df9093'}, {'type': 'PACKAGE', 'url': 'https://github.com/martinpitt/python-dbusmock'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-04-23T16:02:12Z', 'nvd_published_at': '2019-04-22T16:29:00Z'} |
1.4.0 | GHSA-38fc-9xqv-7f7q | 2023-09-01T09:56:00Z | 2019-04-16T15:50:39Z | null | ['CVE-2019-7548'] | SQLAlchemy is vulnerable to SQL Injection via group_by parameter | SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'SQLAlchemy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7548'}, {'type': 'WEB', 'url': 'https://github.com/sqlalchemy/sqlalchemy/issues/4481#issuecomment-461204518'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0981'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0984'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38fc-9xqv-7f7q'}, {'type': 'WEB', 'url': 'https://github.com/no-security/sqlalchemy_test'}, {'type': 'PACKAGE', 'url': 'https://github.com/sqlalchemy/sqlalchemy'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00005.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:34Z', 'nvd_published_at': '2019-02-06T21:29:00Z'} |
1.4.0 | GHSA-jpv3-g4cc-6vfx | 2022-09-17T00:22:23Z | 2019-04-02T15:46:42Z | null | ['CVE-2019-0222'] | Improper Control of Generation of Code ('Code Injection') in org.apache.activemq:activemq-client | In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.15.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0222'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jpv3-g4cc-6vfx'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/71640324661c1b6d0b6708bd4fb20170e1b979370a4b8cddc4f8d485@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7da9636557118178b1690ba0af49c8a7b7b97d925218b5774622f488@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d1e334bd71d6e68462c62c726fe6db565c7a6283302f9c1feed087fa@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190502-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://activemq.apache.org/security-advisories.data/CVE-2019-0222-announcement.txt'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/03/27/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107622'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:05Z', 'nvd_published_at': '2019-03-28T22:29:00Z'} |
1.4.0 | GHSA-gc52-xj6p-9pxp | 2021-08-03T21:24:04Z | 2019-04-30T15:37:21Z | null | ['CVE-2019-3868'] | Exposure of Sensitive Information to an Unauthorized Actor in Keycloak | Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user?s browser session. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3868'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3868'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108061'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-04-30T15:16:15Z', 'nvd_published_at': '2019-04-24T16:29:00Z'} |
1.4.0 | GHSA-3w9q-c44j-37jj | 2021-08-31T21:35:30Z | 2019-04-09T19:43:32Z | null | ['CVE-2019-0773'] | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0783. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0773'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3w9q-c44j-37jj'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0773'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-84p2-vf58-xhxv | 2021-04-23T20:12:41Z | 2019-04-23T16:03:18Z | null | ['CVE-2019-5427'] | Billion laughs attack in c3p0 | c3p0 version < 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.mchange:c3p0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.5.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5427'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/509315'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFIVX6HOVNLAM7W3SUAMHYRNLCVQSAWR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-04-23T16:01:51Z', 'nvd_published_at': '2019-04-22T21:29:00Z'} |
1.4.0 | GHSA-8vmx-qmch-mpqg | 2021-06-15T16:59:53Z | 2019-04-18T14:27:35Z | null | ['CVE-2019-0232'] | High severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core | When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.40'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.94'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0232'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1712'}, {'type': 'WEB', 'url': 'https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/'}, {'type': 'WEB', 'url': 'https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8vmx-qmch-mpqg'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190419-0001/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/'}, {'type': 'WEB', 'url': 'https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-784'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_19_17'}, {'type': 'WEB', 'url': 'https://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/153506/Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/4'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107906'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:43Z', 'nvd_published_at': '2019-04-15T15:29:00Z'} |
1.4.0 | GHSA-xc67-hjx6-cgg6 | 2021-04-23T20:19:57Z | 2019-04-23T16:07:12Z | null | ['CVE-2019-10247'] | Installation information leak in Eclipse Jetty | In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '9.2.28.v20190418'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.27.v20190403'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.27.v20190418'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.3.26.v20190403'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.17.v20190418'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.16.v20190411'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10247'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546577'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190509-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4949'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}] | {'cwe_ids': ['CWE-200', 'CWE-213'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-04-23T16:04:31Z', 'nvd_published_at': '2019-04-22T20:29:00Z'} |
1.4.0 | GHSA-r53m-pfr5-7v87 | 2020-06-17T15:15:06Z | 2019-04-18T14:50:19Z | 2020-06-17T15:15:06Z | [] | Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core | **Withdrawn:** Duplicate of GHSA-qcxh-w3j9-58qr | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.14'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.38'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0199'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r53m-pfr5-7v87'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rcx2-m7jp-p9wj | 2023-09-05T18:21:38Z | 2019-04-09T19:47:27Z | null | ['CVE-2019-10856'] | Jupyter Notebook open redirect vulnerability | In Jupyter Notebook before 5.7.8, an open redirect can occur via an empty netloc. This issue exists because of an incomplete fix for CVE-2019-10255. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10856'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/979e0bd15e794ceb00cc63737fcd5fd9addc4a99'}, {'type': 'WEB', 'url': 'https://blog.jupyter.org/open-redirect-vulnerability-in-jupyter-jupyterhub-adf43583f1e4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rcx2-m7jp-p9wj'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/compare/16cf97c...b8e30ea'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fmpq-w5q6-9vf9 | 2021-06-10T23:43:17Z | 2019-04-02T15:46:48Z | null | ['CVE-2019-0224'] | Moderate severity vulnerability that affects org.apache.jspwiki:jspwiki-main | In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0224'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fmpq-w5q6-9vf9'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0224'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4b4992a93d899050c1117a07c3c7fc9a175ec0672ab97065228de67@%3Cdev.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107631'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mh33-7rrq-662w | 2023-09-05T18:28:03Z | 2019-04-19T16:55:10Z | null | ['CVE-2019-11324'] | Improper Certificate Validation in urllib3 | The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the `ssl_context`, `ca_certs`, or `ca_certs_dir` argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11324'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/1efadf43dc63317cd9eaa3e0fdb9e05ab07254b1'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3335'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3590'}, {'type': 'PACKAGE', 'url': 'https://github.com/urllib3/urllib3'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/compare/a6ec68a...1efadf4'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKGPJLVLVYCL4L4B4G5TIOTVK4BKPG72/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOSA2NT4DUQDBEIWE6O7KKD24XND7TE2/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/urllib3/1.24.2/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3990-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/19/1'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-04-19T16:54:21Z', 'nvd_published_at': '2019-04-18T21:29:00Z'} |
1.4.0 | GHSA-hj2j-77xm-mc5v | 2021-09-14T17:21:42Z | 2019-04-10T14:30:13Z | null | ['CVE-2016-10745'] | High severity vulnerability that affects Jinja2 | In Pallets Jinja before 2.8.1, str.format allows a sandbox escape. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Jinja2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10745'}, {'type': 'WEB', 'url': 'https://github.com/pallets/jinja/commit/9b53045c34e61013dc8f09b7e52a555fa16bed16'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1022'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1237'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1260'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3964'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4062'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hj2j-77xm-mc5v'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/jinja'}, {'type': 'WEB', 'url': 'https://palletsprojects.com/blog/jinja-281-released/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4011-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4011-2/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html'}] | {'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mw6v-crh8-8533 | 2023-09-01T20:02:20Z | 2019-04-30T15:36:41Z | null | ['CVE-2018-7575'] | Integer Overflow or Wraparound in Google TensorFlow | ### Issue Description
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The type of exploitation is context-dependent. The block size in meta file might contain a large int64 value which causes an integer overflow upon addition. Subsequent code using n as index may cause an out-of-bounds read.
### Impact
A maliciously crafted meta checkpoint could be used to cause the TensorFlow process to perform an out of bounds read on in process memory.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7575'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d107fee1e4a9a4462f01564798d345802acc2aef'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-004.md'}] | {'cwe_ids': ['CWE-190'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-04-30T15:16:08Z', 'nvd_published_at': '2019-04-24T21:29:00Z'} |
1.4.0 | GHSA-462w-v97r-4m45 | 2023-08-30T21:01:31Z | 2019-04-10T14:30:24Z | null | ['CVE-2019-10906'] | Jinja2 sandbox escape via string formatting | In Pallets Jinja before 2.10.1, `str.format_map` allows a sandbox escape.
The sandbox is used to restrict what code can be evaluated when rendering untrusted, user-provided templates. Due to the way string formatting works in Python, the `str.format_map` method could be used to escape the sandbox.
This issue was previously addressed for the `str.format` method in Jinja 2.8.1, which discusses the issue in detail. However, the less-common `str.format_map` method was overlooked. This release applies the same sandboxing to both methods.
If you cannot upgrade Jinja, you can override the `is_safe_attribute` method on the sandbox and explicitly disallow the `format_map` method on string objects. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Jinja2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10906'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1152'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1237'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1329'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-462w-v97r-4m45'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/09fc842ff444cd43d9d4c510756fec625ef8eb1175f14fd21de2605f@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2b52b9c8b9d6366a4f1b407a8bde6af28d9fc73fdb3b37695fd0d9ac@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/320441dccbd9a545320f5f07306d711d4bbd31ba43dc9eebcfc602df@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/46c055e173b52d599c648a98199972dbd6a89d2b4c4647b0500f2284@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/57673a78c4d5c870d3f21465c7e2946b9f8285c7c57e54c2ae552f02@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7f39f01392d320dfb48e4901db68daeece62fd60ef20955966739993@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b2380d147b508bbcb90d2cad443c159e63e12555966ab4f320ee22da@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f0c4a03418bcfe70c539c5dbaf99c04c98da13bfa1d3266f08564316@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSW3QZMFVVR7YE3UT4YRQA272TYAL5AF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCDYIS254EJMBNWOG4S5QY6AOTOR4TZU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS7IVZAJBWOHNRDMFJDIZVFCMRP6YIUQ/'}, {'type': 'WEB', 'url': 'https://palletsprojects.com/blog/jinja-2-10-1-released'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4011-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4011-2/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html'}] | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:35Z', 'nvd_published_at': '2019-04-07T00:29:00Z'} |
1.4.0 | GHSA-rv62-4pmj-xw6h | 2023-09-05T12:34:54Z | 2019-04-02T15:46:54Z | null | ['CVE-2019-10255'] | Open Redirect vulnerability in jupyterhub and notebook | An Open Redirect vulnerability for all browsers in Jupyter Notebook before 5.7.8 and some browsers (Chrome, Firefox) in JupyterHub before 0.9.6 allows crafted links to the login page, which will redirect to a malicious site after successful login. Servers running on a base_url prefix are not affected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'jupyterhub'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10255'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/08c4c898182edbe97aadef1815cce50448f975cb'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/70fe9f0ddb3023162ece21fbb77d5564306b913b'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/d65328d4841892b412aef9015165db1eb029a8ed'}, {'type': 'WEB', 'url': 'https://blog.jupyter.org/open-redirect-vulnerability-in-jupyter-jupyterhub-adf43583f1e4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rv62-4pmj-xw6h'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/compare/05aa4b2...16cf97c'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UP5RLEES2JBBNSNLBR65XM6PCD4EMF7D/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMDPJBVXOVO6LYGAT46VZNHH6JKSCURO/'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-72p5-2r6g-fm6v | 2021-06-11T14:16:33Z | 2019-04-02T15:46:52Z | null | ['CVE-2019-10260'] | Moderate severity vulnerability that affects total.js | Total.js CMS 12.0.0 has XSS related to themes/admin/views/index.html (item.message) and themes/admin/public/ui.js (column.format). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'total.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0-13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0-12'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10260'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/cms/commit/75205f93009db3cf8c0b0f4f1fc8ab82d70da8ad'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/cms/commit/8b9d7dada998c08d172481d9f0fc0397c4b3c78d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-72p5-2r6g-fm6v'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r8h9-hq9c-2p5c | 2021-09-17T14:43:23Z | 2019-04-08T15:18:54Z | null | ['CVE-2019-1010260'] | High severity vulnerability that affects com.github.shyiko.ktlint:ktlint-core | Using ktlint to download and execute custom rulesets can result in arbitrary code execution as the served jars can be compromised by a MITM. This attack is exploitable via Man in the Middle of the HTTP connection to the artifact servers. This vulnerability appears to have been fixed in 0.30.0 and later; after commit 5e547b287d6c260d328a2cb658dbe6b7a7ff2261. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.github.shyiko.ktlint:ktlint-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.30.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010260'}, {'type': 'WEB', 'url': 'https://github.com/shyiko/ktlint/pull/332'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r8h9-hq9c-2p5c'}, {'type': 'PACKAGE', 'url': 'https://github.com/shyiko/ktlint'}] | {'cwe_ids': ['CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-frxx-2m33-6wcr | 2023-09-01T20:17:19Z | 2019-04-24T16:11:30Z | null | ['CVE-2018-8825'] | Improper Restriction of Operations within the Bounds of a Memory Buffer in Google TensorFlow | Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). Users passing a malformed or malicious version of a TFLite graph into TOCO will cause TOCO to crash or cause a buffer overflow, potentially allowing malicious code to be executed.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8825'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/41335abb46f80ca644b5738550daef6136ba5476'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8badd11d875a826bd318ed439909d5c47a7fb811'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-003.md'}] | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-04-24T16:11:11Z', 'nvd_published_at': '2019-04-23T21:29:00Z'} |
1.4.0 | GHSA-jwqm-c9f2-2cq3 | 2021-12-03T14:33:13Z | 2019-04-15T16:19:23Z | null | ['CVE-2019-10240'] | Cleartext Transmission of Sensitive Information, Inclusion of Functionality from Untrusted Control Sphere , and Download of Code Without Integrity Check in Eclipse hawkBit | Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-autoconfigure'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-starters'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-boot-starter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-update-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-boot-starter-mgmt-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-boot-starter-mgmt-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-boot-starter-dmf-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-boot-starter-ddi-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10240'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jwqm-c9f2-2cq3'}] | {'cwe_ids': ['CWE-319', 'CWE-494', 'CWE-829'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-03T14:33:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qpvx-gpqm-g98j | 2021-09-16T20:03:33Z | 2019-04-18T14:28:03Z | null | ['CVE-2019-7644'] | Critical severity vulnerability that affects Auth0-WCF-Service-JWT | Auth0 Auth0-WCF-Service-JWT before 1.0.4 leaks the expected JWT signature in an error message when it cannot successfully validate the JWT signature. If this error message is presented to an attacker, they can forge an arbitrary JWT token that will be accepted by the vulnerable application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Auth0-WCF-Service-JWT'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7644'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2019-7644'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qpvx-gpqm-g98j'}] | {'cwe_ids': ['CWE-209'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rcj2-vvjx-87pm | 2021-05-11T14:57:28Z | 2019-04-22T17:15:40Z | null | ['CVE-2019-11404'] | Missing Encryption of Sensitive Data in arrow-kt Arrow | arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by an MITM attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.arrow-kt:arrow-ank-gradle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11404'}, {'type': 'WEB', 'url': 'https://github.com/arrow-kt/ank/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/arrow-kt/arrow/issues/1310'}, {'type': 'WEB', 'url': 'https://github.com/arrow-kt/ank/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/arrow-kt/arrow/commit/74198dab522393487d5344f194dc21208ab71ae8'}, {'type': 'WEB', 'url': 'https://github.com/arrow-kt/arrow/releases/tag/0.9.0'}] | {'cwe_ids': ['CWE-311'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-04-22T17:15:03Z', 'nvd_published_at': '2019-04-22T11:29:00Z'} |
1.4.0 | GHSA-5xc6-fpc7-4qvg | 2023-09-05T18:40:23Z | 2019-04-08T15:19:01Z | null | ['CVE-2018-12680'] | CoAPthon DoS due to Exceptions | The `Serialize.deserialize()` method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'CoAPthon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12680'}, {'type': 'WEB', 'url': 'https://github.com/Tanganelli/CoAPthon/issues/135'}, {'type': 'PACKAGE', 'url': 'https://github.com/Tanganelli/CoAPthon'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5xc6-fpc7-4qvg'}] | {'cwe_ids': ['CWE-400', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jfq2-rj7f-9gvf | 2021-08-03T19:06:32Z | 2019-04-24T16:11:27Z | null | ['CVE-2018-7576'] | Null pointer dereference in TensorFlow leads to exploitation | Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of exploitation is: context-dependent. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7576'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-002.md'}] | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-04-24T16:11:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rg3q-jxmp-pvjj | 2022-09-17T00:24:09Z | 2019-04-09T19:44:37Z | null | ['CVE-2019-11004'] | Materialize-css vulnerable to Improper Neutralization of Input During Web Page Generation | In Materialize through 1.0.0, XSS is possible via the Toast feature. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'materialize-css'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@materializecss/materialize'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0-alpha'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11004'}, {'type': 'WEB', 'url': 'https://github.com/Dogfalo/materialize/issues/6286'}, {'type': 'WEB', 'url': 'https://github.com/Dogfalo/materialize/issues/6331#issuecomment-549080183'}, {'type': 'WEB', 'url': 'https://github.com/materializecss/materialize/pull/49'}, {'type': 'WEB', 'url': 'https://github.com/samschurter/materialize/commit/3aae4cc9bb2b58c337bf25d2f04f129a2a0fa78f'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dogfalo/materialize'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rg3q-jxmp-pvjj'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:40Z', 'nvd_published_at': None} |