Dataset Viewer
Auto-converted to Parquet Duplicate
schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
nulllengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
14
228
details
stringlengths
48
1.45k
severity
stringlengths
2
78
affected
stringlengths
79
6.96k
references
stringlengths
143
6.38k
database_specific
stringlengths
131
174
1.4.0
GHSA-f7ph-p5rv-phw2
2020-08-31T18:12:27Z
2018-11-06T23:13:37Z
null
['CVE-2016-10547']
Cross-Site Scripting in nunjucks
Affected versions of `nunjucks` do not properly escape specially structured user input in template vars when in auto-escape mode, resulting in a cross-site scripting vulnerability. ## Proof of Concept By using an array for the keys in a template var, escaping is bypassed. ```javascript name[]=<script>alert(1)</script...
[]
[{'package': {'ecosystem': 'npm', 'name': 'nunjucks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10547'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/nunjucks/issues/835'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f7ph-p5rv-phw2'}, {'type': 'WEB', 'url': 'https://github.com/matt-/nunjucks_test'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:04Z', 'nvd_published_at': None}
1.4.0
GHSA-rwg6-3fmj-w4wx
2023-09-08T23:30:49Z
2018-11-01T14:47:21Z
null
['CVE-2017-16061']
tkinter is malware
The `tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tkinter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16061'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/500'}]
{'cwe_ids': ['CWE-433', 'CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:07Z', 'nvd_published_at': None}
1.4.0
GHSA-xgc9-9w4v-h33h
2021-09-21T22:31:15Z
2018-11-06T23:17:27Z
null
['CVE-2018-1321']
High severity vulnerability that affects org.apache.syncope:syncope-core
An administrator with report and template entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1321'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xgc9-9w4v-h33h'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45400/'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security.html#CVE-2018-1321:_Remote_co...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:16Z', 'nvd_published_at': None}
1.4.0
GHSA-xvch-r4wf-h8w9
2022-09-14T22:05:10Z
2018-11-21T22:22:21Z
null
['CVE-2018-17187']
Improper Certificate Validation in proton-j
The Apache Qpid Proton-J transport includes an optional wrapper layer to perform TLS, enabled by use of the 'transport.ssl(...)' methods. Unless a verification mode was explicitly configured, client and server modes previously defaulted as documented to not verifying a peer certificate, with options to configure this e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:proton-j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3'}, {'fixed': '0.30.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.29.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17187'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xvch-r4wf-h8w9'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/PROTON-1962'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/qpid-users/201...
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:36Z', 'nvd_published_at': None}
1.4.0
GHSA-5xgh-643p-cp2g
2022-09-21T22:28:56Z
2018-11-21T22:19:59Z
null
['CVE-2018-17574']
Cross-site Scripting in yapi-vendor
An issue was discovered in YMFE YApi 1.3.23. There is stored XSS in the name field of a project.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'yapi-vendor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17574'}, {'type': 'WEB', 'url': 'https://github.com/YMFE/yapi/issues/520'}, {'type': 'PACKAGE', 'url': 'https://github.com/YMFE/yapi'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5xgh-643p-cp2g'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:36Z', 'nvd_published_at': None}
1.4.0
GHSA-26q7-g57v-mxcp
2020-08-31T18:19:13Z
2018-11-07T00:28:11Z
null
['CVE-2017-16043']
HTML Injection in shout
Affected versions of `shout` do not escape the `/topic` command in messages, and are therefore vulnerable to cross-site scripting. ## Recommendation Update to version 0.50.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'shout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.44.0'}, {'fixed': '0.50.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.49.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16043'}, {'type': 'WEB', 'url': 'https://github.com/erming/shout/pull/344'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-26q7-g57v-mxcp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/322'}]
{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:31Z', 'nvd_published_at': None}
1.4.0
GHSA-7g2w-6r25-2j7p
2023-09-07T18:15:41Z
2018-11-01T14:51:33Z
null
['CVE-2018-16461']
Command Injection in libnmap
Versions of `libnmap` before 0.4.16 are vulnerable to command injection. Proof of concept ```js const nmap = require('libnmap'); const opts = { range: [ 'scanme.nmap.org', "x.x.$(touch success.txt)" ] }; nmap.scan(opts, function(err, report) { if (err) throw new Error(err); for (let ...
[]
[{'package': {'ecosystem': 'npm', 'name': 'libnmap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16461'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390865'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7g2w-6r25-2j7p'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/474.json'}...
{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:42Z', 'nvd_published_at': None}
1.4.0
GHSA-3hvm-hgpw-rx4j
2023-09-12T20:40:50Z
2018-11-06T23:11:10Z
null
['CVE-2018-16475']
Path Traversal in knightjs
All versions of `knightjs` are vulnerable to Path Traversal. This vulnerability allows an attacker to read content of arbitrary files on the server due to lack of input validation. ## Recommendation As there is currently no fix for this module we recommend not using this module in production environments.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'knightjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16475'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403707'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3hvm-hgpw-rx4j'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json'}...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:20Z', 'nvd_published_at': None}
1.4.0
GHSA-23xp-j737-282v
2023-09-07T22:55:00Z
2018-11-06T23:12:30Z
null
['CVE-2018-16473']
Path Traversal in takeapeek
All versions of `takeapeek` are vulnerable to path traversal exposing files and directories. ## Recommendation As no fix is currently available for this vulnerability is it is our recommendation to use another static file server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'takeapeek'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16473'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403736'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-23xp-j737-282v'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/478.json'}...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:15Z', 'nvd_published_at': None}
1.4.0
GHSA-wv26-rj8c-4r33
2022-09-14T22:00:43Z
2018-11-06T23:15:13Z
null
['CVE-2018-6874']
Cross-Site Request Forgery (CSRF) in Auth0
CSRF exists in the Auth0 authentication service through 14591 if the Legacy Lock API flag is enabled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6874'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2018-6874'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wv26-rj8c-4r33'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103695'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:12Z', 'nvd_published_at': None}
1.4.0
GHSA-3p4q-x8f3-p7vq
2023-09-05T19:12:36Z
2018-11-21T22:19:22Z
null
['CVE-2018-19352']
Jupyter Notebook XSS via directory name
Jupyter Notebook before 5.7.2 allows XSS via a crafted directory name because notebook/static/tree/js/notebooklist.js handles certain URLs unsafely.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19352'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/288b73e1edbf527740e273fcc69b889460871648'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3p4q-x8f3-p7vq'}, {'type': 'PACKAGE', 'url': 'https://github.com...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:38Z', 'nvd_published_at': None}
1.4.0
GHSA-c2fx-8r76-gh36
2020-06-16T21:29:59Z
2018-11-06T23:14:22Z
null
['CVE-2013-7323']
High severity vulnerability that affects python-gnupg
python-gnupg before 0.3.5 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.3.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7323'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c2fx-8r76-gh36'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/243'}, {'type': 'WEB', 'url': '...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:59Z', 'nvd_published_at': None}
1.4.0
GHSA-r3vr-prwv-86g9
2021-09-17T14:15:08Z
2018-11-06T23:14:39Z
null
['CVE-2014-1927']
High severity vulnerability that affects python-gnupg
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928. NOTE: this vulnera...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.5'}, {'fixed': '0.3.6'}]}], 'versions': ['0.3.5']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1927'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/vinay.sajip/python-gnupg'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/issues/detail?id=98'}, {'type': ...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:37Z', 'nvd_published_at': None}
1.4.0
GHSA-3rh7-vm4x-q2hp
2023-09-12T18:40:34Z
2018-11-09T17:49:22Z
null
['CVE-2017-16055']
sqlserver is malware
The `sqlserver` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sqlserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16055'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3rh7-vm4x-q2hp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/486'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:09Z', 'nvd_published_at': None}
1.4.0
GHSA-2jc8-4r6g-282j
2020-06-16T20:52:26Z
2018-11-06T23:13:02Z
null
['CVE-2014-1928']
Moderate severity vulnerability that affects python-gnupg
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-201...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.5'}, {'fixed': '0.3.6'}]}], 'versions': ['0.3.5']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1928'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/issues/detail?id=98'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2jc8-4r6g-282j'}, {'typ...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:26Z', 'nvd_published_at': None}
1.4.0
GHSA-hg78-4f6x-99wq
2023-08-28T12:46:14Z
2018-11-15T15:58:58Z
null
['CVE-2018-16470']
Rack vulnerable to Denial of Service
There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.4'}, {'fixed': '2.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16470'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3172'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2018-16470...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:04Z', 'nvd_published_at': None}
1.4.0
GHSA-g68x-vvqq-pvw3
2023-09-08T21:34:45Z
2018-11-21T22:19:50Z
null
['CVE-2018-17960']
Ckeditor XSS Vulnerability
CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste. It was possible to execute XSS inside the CKEditor source area after persuading the victim to: (i) switch CKEditor to source mode, then (ii) paste a specially crafted HTML code, prepared by the attacker, into the opened CKEditor source a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ckeditor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17960'}, {'type': 'WEB', 'url': 'https://ckeditor.com/blog/CKEditor-4.11-with-emoji-dropdown-and-auto-link-on-typing-released/'}, {'type': 'WEB', 'url': 'https://ckeditor.com/cke4/release/CKEditor-4.11.0'}, {'type': 'ADVISORY', 'url': 'https://gith...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:12Z', 'nvd_published_at': None}
1.4.0
GHSA-vgrx-w6rg-8fqf
2020-08-31T18:10:20Z
2018-11-06T23:12:07Z
null
['CVE-2016-10555']
Forgeable Public/Private Tokens in jwt-simple
Affected versions of the `jwt-simple` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authent...
[]
[{'package': {'ecosystem': 'npm', 'name': 'jwt-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10555'}, {'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/pull/16'}, {'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/commit/957957...
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:45Z', 'nvd_published_at': None}
1.4.0
GHSA-c7c7-xm8g-xm36
2022-09-14T21:59:56Z
2018-11-01T14:48:29Z
null
['CVE-2018-18830']
Unrestricted Upload of File with Dangerous Type in mingsoft:ms-mcms
An issue was discovered in com\mingsoft\basic\action\web\FileAction.java in MCMS 4.6.5. Since the upload interface does not verify the user login status, you can use this interface to upload files without setting a cookie. First, start an upload of JSP code with a .png filename, and then intercept the data packet. In t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18830'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/mingSoft/MCMS'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/IO0IQ'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c7c7-xm8g-xm36'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:25Z', 'nvd_published_at': None}
1.4.0
GHSA-2mw7-wggm-m6w3
2022-09-14T22:05:59Z
2018-11-21T22:22:46Z
null
['CVE-2018-19183']
Denial of Service in ethereumjs-vm
ethereumjs-vm 2.4.0 allows attackers to cause a denial of service (vm.runCode failure and REVERT) via a "code: Buffer.from(my_code, 'hex')" attribute.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ethereumjs-vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19183'}, {'type': 'WEB', 'url': 'https://github.com/ethereumjs/ethereumjs-vm/issues/386'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2mw7-wggm-m6w3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereumjs/ethereumjs-vm'}]
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:41Z', 'nvd_published_at': None}
1.4.0
GHSA-qfjv-998w-q48f
2021-09-16T19:56:56Z
2018-11-06T23:15:46Z
null
['CVE-2018-17186']
High severity vulnerability that affects org.apache.syncope:syncope-core
An administrator with workflow definition entitlements can use DTD to perform malicious operations, including but not limited to file read, file write, and code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17186'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qfjv-998w-q48f'}, {'type': 'WEB', 'url': 'https://syncope.apache.org/security#CVE-2018-17186:_XXE_on_BPMN_definitions'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:44Z', 'nvd_published_at': None}
1.4.0
GHSA-jmf4-pq78-f8vj
2021-09-14T19:47:15Z
2018-11-21T22:24:50Z
null
['CVE-2018-1314']
Moderate severity vulnerability that affects org.apache.hive:hive-jdbc
In Apache Hive 2.3.3, 3.1.0 and earlier, Hive "EXPLAIN" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do "EXPLAIN" on arbitrary table or view and expose table metadata and statistics.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1314'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jmf4-pq78-f8vj'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3da47dbcbf09697387f29d2f1aed970523b6b334d93afd3cced23727@%3Cdev.hive.apache.org%3E'}, {'type': 'W...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:44Z', 'nvd_published_at': None}
1.4.0
GHSA-q257-vv4p-fg92
2023-09-08T23:24:59Z
2018-11-09T17:49:34Z
null
['CVE-2017-16005']
Header Forgery in http-signature
Affected versions of `http-signature` contain a vulnerability which can allow an attacker in a privileged network position to modify header names and change the meaning of the request, without requiring an updated signature. This problem occurs because vulnerable versions of `http-signature` sign the contents of head...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'http-signature'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16005'}, {'type': 'WEB', 'url': 'https://github.com/joyent/node-http-signature/issues/10'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q257-vv4p-fg92'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/318'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:21Z', 'nvd_published_at': None}
1.4.0
GHSA-38h8-x697-gh8q
2023-09-07T20:13:49Z
2018-11-09T17:45:30Z
null
['CVE-2017-16024']
Tmp files readable by other users in sync-exec
Affected versions of `sync-exec` use files located in `/tmp/` to buffer command results before returning values. As `/tmp/` is almost always set with world readable permissions, this may allow low privilege users on the system to read the results of commands run via `sync-exec` under a higher privilege user. ## Recom...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sync-exec'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16024'}, {'type': 'WEB', 'url': 'https://github.com/gvarsanyi/sync-exec/issues/17'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/377.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38h8-x697-gh8q'}, {'type...
{'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:36Z', 'nvd_published_at': None}
1.4.0
GHSA-rxmr-c9jm-7mm8
2022-09-14T22:07:44Z
2018-11-21T22:24:22Z
null
['CVE-2018-1284']
Exposure of Sensitive Information to an Unauthorized Actor in Apache hive
In Apache Hive 0.6.0 to 2.3.2, malicious user might use any xpath UDFs (xpath/xpath_string/xpath_boolean/xpath_number/xpath_double/xpath_float/xpath_long/xpath_int/xpath_short) to expose the content of a file on the machine running HiveServer2 owned by HiveServer2 user (usually hive) if hive.server2.enable.doAs=false.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '2.3.3...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1284'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rxmr-c9jm-7mm8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/29184dbce4a37be2af36e539ecb479b1d27868f73ccfdff46c7174b4@%3Cdev.hive.apache.org%3E'}, {'type': 'W...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:20Z', 'nvd_published_at': None}
1.4.0
GHSA-32w7-9whp-cjp9
2022-09-14T22:08:57Z
2018-11-29T21:30:56Z
null
['CVE-2018-19443']
Session Fixation in Tryton
The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tryton'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.1'}]}], 'versions': ['5.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19443'}, {'type': 'WEB', 'url': 'https://bugs.tryton.org/issue7792'}, {'type': 'WEB', 'url': 'https://discuss.tryton.org/t/security-release-for-issue7792/830'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-32w7-9whp-cjp9'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:42Z', 'nvd_published_at': None}
1.4.0
GHSA-9xgh-xgw5-p5cw
2023-09-14T17:55:59Z
2018-11-09T17:42:54Z
null
['CVE-2017-16057']
nodemssql is malware
The `nodemssql` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodemssql'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16057'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9xgh-xgw5-p5cw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/484'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:51Z', 'nvd_published_at': None}
1.4.0
GHSA-x3g3-334f-q6h4
2023-09-08T19:44:37Z
2018-11-09T17:41:15Z
null
['CVE-2018-19056']
Pandao editor.md vulnerable to DOM XSS
pandao Editor.md 1.5.0 has DOM XSS via input starting with a `<<` substring, which is mishandled during construction of an `A` element.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.5.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19056'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/634'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x3g3-334f-q6h4'}, {'type': 'PACKAGE', 'url': 'https://github.com/pandao/editor.md'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:53Z', 'nvd_published_at': None}
1.4.0
GHSA-g4xq-jx4w-4cjv
2023-01-23T17:08:55Z
2018-11-01T14:46:01Z
null
['CVE-2018-16468']
Loofah Cross-site Scripting vulnerability
In the Loofah gem for Ruby, through version 2.2.2, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished. Users are advised to upgrade to version 2.2.3. See https://github.com/flavorjones/loofah/issues/154 for more details.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16468'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/issues/154'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4364'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:07Z', 'nvd_published_at': None}
1.4.0
GHSA-vcr5-xr9h-mvc5
2023-09-01T20:54:16Z
2018-11-06T23:12:48Z
null
['CVE-2014-1929']
python-gnupg vulnerable to shell injection
python-gnupg 0.3.5 and 0.3.6 allow for shell injection via a failure to escape backslashes in the `shell_quote()` function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.5'}, {'fixed': '0.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1929'}, {'type': 'WEB', 'url': 'https://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/2014-June/028512.html'}, {'type': 'WEB', 'url': 'https://code.google.com/archive/p/python-gnupg/issues/98'}, {'type': 'ADVISORY', 'url': 'http...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:27Z', 'nvd_published_at': None}
1.4.0
GHSA-jf2m-435m-mxw8
2022-09-14T22:08:10Z
2018-11-21T22:24:34Z
null
['CVE-2018-1282']
SQL Injection in hive-jdbc
This vulnerability in Apache Hive JDBC driver 0.7.1 to 2.3.2 allows carefully crafted arguments to be used to bypass the argument escaping/cleanup that JDBC driver does in PreparedStatement implementation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.1'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1282'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jf2m-435m-mxw8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/74bd2bff1827febb348dfb323986fa340d3bb97a315ab93c3ccc8299@%3Cdev.hive.apache.org%3E'}, {'type': 'W...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:10Z', 'nvd_published_at': None}
1.4.0
GHSA-wg85-p6j7-gp3w
2023-09-07T00:08:31Z
2018-11-21T22:21:25Z
null
['CVE-2018-19057']
SimpleMDE XSS Vulnerability
SimpleMDE 1.11.2 has XSS via an onerror attribute of a crafted IMG element, or via certain input with `[` and `(` characters, which is mishandled during construction of an `A` element.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'simplemde'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19057'}, {'type': 'WEB', 'url': 'https://github.com/sparksuite/simplemde-markdown-editor/issues/721'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wg85-p6j7-gp3w'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparksuite/simpl...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:23Z', 'nvd_published_at': None}
1.4.0
GHSA-q3jg-4c82-j4xh
2022-09-14T22:09:19Z
2018-11-29T21:30:30Z
null
['CVE-2018-15795']
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Pivotal CredHub Service Broker
Pivotal CredHub Service Broker, versions prior to 1.1.0, uses a guessable form of random number generation in creating service broker's UAA client. A remote malicious user may guess the client secret and obtain or modify credentials for users of the CredHub Service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.credhub:spring-credhub-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15795'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q3jg-4c82-j4xh'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-15795'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105915'}]
{'cwe_ids': ['CWE-338'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:43Z', 'nvd_published_at': None}
1.4.0
GHSA-phg2-9c5g-m4q7
2022-09-14T22:04:46Z
2018-11-21T22:19:30Z
null
['CVE-2018-17190']
Remote Code Execution in spark-core
In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code too. Note that this ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17190'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-phg2-9c5g-m4q7'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E'}, {'type': ...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:15Z', 'nvd_published_at': None}
1.4.0
GHSA-xqqr-p362-6rmc
2023-09-12T21:11:28Z
2018-11-09T17:44:20Z
null
['CVE-2017-16029']
Directory Traversal in hostr
Affected versions of `hostr` are vulnerable to directory traversal which allows attackers to read files outside the current directory by sending `../` in the url path for GET requests. ## Recommendation Upgrade to version 2.3.6 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'hostr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16029'}, {'type': 'WEB', 'url': 'https://github.com/henrytseng/hostr/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/henrytseng/hostr/issues/8)'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xqqr-p362-6rmc'}, {'type': 'WE...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:17Z', 'nvd_published_at': None}
1.4.0
GHSA-cfw5-v7cw-69cw
2021-09-09T17:08:40Z
2018-11-09T17:49:49Z
null
['CVE-2018-1337']
Critical severity vulnerability that affects org.apache.directory.api:apache-ldap-api
In Apache LDAP API before 1.0.2, a bug in the way the SSL Filter was setup made it possible for another thread to use the connection before the TLS layer has been established, if the connection has already been used and put back in a pool of connections, leading to leaking any information contained in this request (inc...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.directory.api:apache-ldap-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1337'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cfw5-v7cw-69cw'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d66081195e9a02ee7cc20fb243b60467d1419586eed28297d820768f@%3Cdev.directory.apache.org%3E'}, {'type...
{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:24Z', 'nvd_published_at': None}
1.4.0
GHSA-8rhc-48pp-52gr
2021-09-07T20:33:02Z
2018-11-09T17:43:25Z
null
['CVE-2017-12612']
High severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user account on the local machine. It does not...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fix...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12612'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8rhc-48pp-52gr'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/spark-dev/201709.mbox/%3CCAEccTyy-1yYuhdNgkBUg0sr9NeaZSrBKkBePdTNZbxXZNTAR-g%40mail.gmail.c...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:38Z', 'nvd_published_at': None}
1.4.0
GHSA-jhgp-hvj6-x2p2
2023-09-12T18:44:07Z
2018-11-06T23:12:01Z
null
['CVE-2018-16474']
Stored Cross-Site Scripting in tianma-static
All versions of `tianma-static` are vulnerable to stored cross-site scripting (XSS). The vulnerability is exploitable if a user can control the name of a file that is served by `tianma-static` ## Recommendation As no fix is available for this vulnerability at this time it is our recommendation to use another static ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tianma-static'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16474'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403692'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhgp-hvj6-x2p2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/741'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:28Z', 'nvd_published_at': None}
1.4.0
GHSA-j7c4-2xj8-wm7r
2022-09-14T22:51:45Z
2018-11-01T14:49:30Z
null
['CVE-2015-5159']
Improper Input Validation in kdcproxy
python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'kdcproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5159'}, {'type': 'WEB', 'url': 'https://github.com/latchset/kdcproxy/commit/f274aa6787cb8b3ec1cc12c440a56665b7231882'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1245200'}, {'type': 'ADVISORY', 'url': 'https://github.com/a...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:25Z', 'nvd_published_at': None}
1.4.0
GHSA-hhrp-qm88-xjr3
2023-09-07T18:23:41Z
2018-11-21T22:19:41Z
null
['CVE-2018-19289']
Valine HTML Injection
An issue was discovered in Valine v1.3.3. It allows HTML injection, which can be exploited for JavaScript execution via an EMBED element in conjunction with a .pdf file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'valine'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19289'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/issues/127'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/commit/32d4d5e68df804f0eabb1a2bebbbf9459e31c2b7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:20Z', 'nvd_published_at': None}
1.4.0
GHSA-w4r4-65mg-45x2
2022-12-06T16:40:49Z
2018-11-09T17:41:46Z
null
['CVE-2018-11770']
org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 Improper Authentication vulnerability
From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via spark-submit. However...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '2.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11770'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485%40%3Cdev.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:32Z', 'nvd_published_at': '2018-08-13T16:29:00Z'}
1.4.0
GHSA-9xw9-pvgv-6p76
2023-09-13T19:36:45Z
2018-11-09T17:47:52Z
null
['CVE-2017-16014']
Insufficient Error Handling in http-proxy
Affected versions of `http-proxy` are vulnerable to a denial of service attack, wherein an attacker can force an error which will cause the server to crash. ## Recommendation Update to version 0.7.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'http-proxy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.6.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16014'}, {'type': 'WEB', 'url': 'https://github.com/nodejitsu/node-http-proxy/pull/101'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9xw9-pvgv-6p76'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/323'}]
{'cwe_ids': ['CWE-703'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:54Z', 'nvd_published_at': None}
1.4.0
GHSA-v3vf-2r98-xw8w
2022-09-14T22:51:27Z
2018-11-06T23:17:25Z
null
['CVE-2018-1322']
Exposure of Sensitive Information to an Unauthorized Actor in Apache syncope-cope
An administrator with user search entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can recover sensitive security values using the fiql and orderby parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1322'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v3vf-2r98-xw8w'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45400/'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security.html#CVE-2018-1322:_Informati...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:33Z', 'nvd_published_at': None}
1.4.0
GHSA-wg96-3933-j2w5
2023-09-08T23:10:15Z
2018-11-09T17:45:55Z
null
['CVE-2017-16017']
Cross-Site Scripting in sanitize-html
Affected versions of `sanitize-html` are vulnerable to cross-site scripting. ## Proof of Concept: `<IMG SRC= onmouseover="alert('XSS');">` produces the following: `<img src="onmouseover="alert('XSS');"" />` This is definitely invalid HTML, but would suggest that it's being interpreted incorrectly by the parser. ##...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sanitize-html'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16017'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/issues/19'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/pull/20'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wg96-3933-j2w5'}, {'t...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:25Z', 'nvd_published_at': None}
1.4.0
GHSA-5r2p-j47h-mhpg
2023-08-28T12:48:11Z
2018-11-15T15:59:08Z
null
['CVE-2018-16471']
Rack vulnerable to Cross-site Scripting
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16471'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2018-16471.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rub...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:10Z', 'nvd_published_at': None}
1.4.0
GHSA-ghgj-3xqr-6jfm
2022-09-14T01:06:27Z
2018-11-09T17:50:00Z
null
['CVE-2015-2080']
Jetty vulnerable to exposure of sensitive information to unauthenticated remote users
The exception handling code in Eclipse Jetty prior to 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.9.v20150224'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.8.v20150217'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2080'}, {'type': 'WEB', 'url': 'https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ghgj-3xqr-6jfm'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:23Z', 'nvd_published_at': None}
1.4.0
GHSA-p639-xxv5-j383
2022-09-14T22:07:19Z
2018-11-21T22:24:08Z
null
['CVE-2018-1315']
Incorrect Permission Assignment for Critical Resource in Apache hive
In Apache Hive 2.1.0 to 2.3.2, when 'COPY FROM FTP' statement is run using HPL/SQL extension to Hive, a compromised/malicious FTP server can cause the file to be written to an arbitrary location on the cluster where the command is run from. This is because FTP client code in HPL/SQL does not verify the destination loca...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.3...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1315'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p639-xxv5-j383'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d5da94ef60312c01a8d2348466680d1b5fb70702c71a3e84e94f7933@%3Cdev.hive.apache.org%3E'}]
{'cwe_ids': ['CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:04Z', 'nvd_published_at': None}
1.4.0
GHSA-9jm3-5835-537m
2023-09-13T19:36:05Z
2018-11-01T14:48:50Z
null
['CVE-2018-16462']
Command Injection in apex-publish-static-files
Versions of `apex-publish-static-files` before 2.0.1 are vulnerable to command injection. This is exploitable if user input is passed into the `connectString` option in the `publish` method. ## Recommendation Update to version 2.0.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'apex-publish-static-files'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16462'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/405694'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9jm3-5835-537m'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/475.json'}...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:57Z', 'nvd_published_at': None}
1.4.0
GHSA-qw3g-35hc-fcrh
2023-09-12T21:05:41Z
2018-11-09T17:45:38Z
null
['CVE-2017-16018']
Cross-Site Scripting (XSS) in restify
Affected versions of `restify` are susceptible to a cross-site scripting vulnerability when using URL encoded script tags in a non-existent URL. ## Proof of Concept: Request ``` https://localhost:3000/no5_such3_file7.pl?%22%3E%3Cscript%3Ealert(73541);%3C/script%3E ``` Will be included in response: ```<script>alert(...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'restify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16018'}, {'type': 'WEB', 'url': 'https://github.com/restify/node-restify/issues/1018'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qw3g-35hc-fcrh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/314'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:56Z', 'nvd_published_at': None}
1.4.0
GHSA-7xfp-9c55-5vqj
2023-09-12T18:48:46Z
2018-11-09T17:44:01Z
null
['CVE-2017-16026']
Remote Memory Exposure in request
Affected versions of `request` will disclose local system memory to remote systems in certain circumstances. When a multipart request is made, and the type of `body` is `number`, then a buffer of that size will be allocated and sent to the remote server as the body. ## Proof of Concept ```js var request = require('re...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'request'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.49.0'}, {'fixed': '2.68.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'request'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16026'}, {'type': 'WEB', 'url': 'https://github.com/request/request/issues/1904'}, {'type': 'WEB', 'url': 'https://github.com/request/request/pull/2018'}, {'type': 'WEB', 'url': 'https://github.com/request/request/pull/2022'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:42Z', 'nvd_published_at': None}
1.4.0
GHSA-fwx5-5fqj-jv98
2020-08-31T18:18:39Z
2018-11-09T17:46:30Z
null
['CVE-2017-16022']
Cross-Site Scripting in morris.js
Affected versions of `morris.js` are vulnerable to cross-site scripting attacks in labels that appear when hovering over a particular point on a generated graph. The text content of these labels is not escaped, so if control over the labels is obtained, script can be injected. The script will run on the client side whe...
[]
[{'package': {'ecosystem': 'npm', 'name': 'morris.js'}, 'versions': ['0.5.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16022'}, {'type': 'WEB', 'url': 'https://github.com/morrisjs/morris.js/pull/464'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fwx5-5fqj-jv98'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/307'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:38Z', 'nvd_published_at': None}
1.4.0
GHSA-mh6f-8j2x-4483
2021-09-15T20:08:26Z
2018-11-26T23:58:21Z
null
[]
Critical severity vulnerability that affects event-stream and flatmap-stream
The NPM package `flatmap-stream` is considered malicious. A malicious actor added this package as a dependency to the NPM `event-stream` package in version `3.3.6`. Users of `event-stream` are encouraged to downgrade to the last non-malicious version, `3.3.4`, or upgrade to the latest 4.x version. Users of `flatma...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'event-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.6'}, {'fixed': '4.0.0'}]}], 'versions': ['3.3.6']}, {'package': {'ecosystem': 'npm', 'name': 'flatmap-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dominictarr/event-stream/issues/116'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mh6f-8j2x-4483'}, {'type': 'PACKAGE', 'url': 'https://github.com/dominictarr/event-stream'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:17Z', 'nvd_published_at': None}
1.4.0
GHSA-vwjj-2852-3765
2023-09-07T18:28:05Z
2018-11-09T17:46:27Z
null
['CVE-2017-16015']
Cross-Site Scripting in forms
Affected versions of `forms` do not properly escape HTML in generated forms, which may result in cross-site scripting. ## Recommendation Update to version 1.3.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'forms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16015'}, {'type': 'WEB', 'url': 'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vwjj-2852-3765'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advi...
{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:34Z', 'nvd_published_at': None}
1.4.0
GHSA-rrfq-g5fq-fc9c
2022-09-14T22:08:31Z
2018-11-21T22:25:04Z
null
['CVE-2018-11777']
Improper Authentication in hive:hive-exec
In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11777'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rrfq-g5fq-fc9c'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/963c8e2516405c9b532b4add16c03b2c5db621e0c83e80f45049cbbb@%3Cdev.hive.apache.org%3E'}, {'type': '...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:42Z', 'nvd_published_at': None}
1.4.0
GHSA-f9cm-qmx5-m98h
2023-09-07T20:34:10Z
2018-11-01T14:45:42Z
null
['CVE-2018-16469']
Prototype Pollution in merge
Versions of `merge` before 1.2.1 are vulnerable to prototype pollution. The `merge.recursive` function can be tricked into adding or modifying properties of the Object prototype. ## Recommendation Update to version 1.2.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'merge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16469'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/381194'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f9cm-qmx5-m98h'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/722'}]
{'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:14Z', 'nvd_published_at': None}
1.4.0
GHSA-qr28-7j6p-9hmv
2023-03-27T22:21:10Z
2018-11-09T17:47:45Z
null
['CVE-2017-1000042']
Content Injection via TileJSON attribute in mapbox.js
Versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios. If `L.mapbox.map` or `L.mapbox.tileLayer` are used to load untrusted TileJSON content from a non-Mapbox URL, it is possible for a malicious user with control over the T...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.7'}]}]}, {'package': {'ecosystem': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000042'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/54327'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qr28-7j6p-9hmv'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mapbox-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:39Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-mwcv-m549-5cm8
2023-09-11T18:23:24Z
2018-11-01T14:47:43Z
null
['CVE-2017-16062']
node-tkinter is malware
The `node-tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is de...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-tkinter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16062'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mwcv-m549-5cm8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/501'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:28Z', 'nvd_published_at': None}
1.4.0
GHSA-mrmf-qwxg-7c3h
2023-09-08T19:51:45Z
2018-11-09T17:48:20Z
null
['CVE-2017-16006']
XSS in Data URI in remarkable
Affected versions of `remarkable` are vulnerable to cross-site scripting. Vulnerable versions of the package allow the use of `data:` URIs in links, and can therefore execute javascript. ## Proof of Concept ```markdown [link](data:text/html,<script>alert('0')</script>) ``` ## Recommendation Update to v1.7.0 or l...
[]
[{'package': {'ecosystem': 'npm', 'name': 'remarkable'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16006'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/issues/227'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mrmf-qwxg-7c3h'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/319'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:10Z', 'nvd_published_at': None}
1.4.0
GHSA-79mx-88w7-8f7q
2021-09-02T21:06:02Z
2018-11-06T23:12:49Z
null
['CVE-2014-9772']
XSS Filter Bypass via Encoded URL in validator
Versions of `validator` prior to 2.0.0 contained an xss filter method that is affected by several filter bypasses. This may result in a cross-site scripting vulnerability. ## Proof of Concept The xss() function removes the word "javascript" when contained inside an attribute. However, it does not properly handle cas...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9772'}, {'type': 'WEB', 'url': 'https://github.com/chriso/validator.js/issues/181'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-79mx-88w7-8f7q'}, {'type': 'PACKAGE', 'url': 'https://github.com/chriso/validator.js'}, {'type': 'W...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:15Z', 'nvd_published_at': None}
1.4.0
GHSA-xc6g-ggrc-qq4r
2023-09-08T23:04:54Z
2018-11-09T17:47:23Z
null
['CVE-2017-16016']
Cross-Site Scripting in sanitize-html
Affected versions of `sanitize-html` are vulnerable to cross-site scripting when allowedTags includes at least one `nonTextTag`. ## Proof of Concept ```js var sanitizeHtml = require('sanitize-html'); var dirty = '!<textarea>&lt;/textarea&gt;<svg/onload=prompt`xs`&gt;</textarea>!'; var clean = sanitizeHtml(dirty, { ...
[]
[{'package': {'ecosystem': 'npm', 'name': 'sanitize-html'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16016'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/issues/100'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403'}, {'type': 'WEB', 'url': 'https://github.com/p...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:52Z', 'nvd_published_at': None}
1.4.0
GHSA-9h9c-f287-c6vp
2022-09-14T22:02:16Z
2018-11-06T23:16:18Z
null
['CVE-2018-17184']
Improper Control of Interaction Frequency in Apache syncope-core
A malicious user with enough administration entitlements can inject html-like elements containing JavaScript statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions. When another user with enough administration entitlements edits one of the Entities above via Admin Console, the injected...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17184'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9h9c-f287-c6vp'}, {'type': 'WEB', 'url': 'https://syncope.apache.org/security#CVE-2018-17184:_Stored_XSS'}]
{'cwe_ids': ['CWE-799'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:47Z', 'nvd_published_at': None}
1.4.0
GHSA-f89g-whpf-6q9m
2023-09-08T23:59:04Z
2018-11-09T17:46:56Z
null
['CVE-2017-16008']
Cross-Site Scripting in i18next
Affected versions of `i18next` allow untrusted user input to be injected into dictionary key names, resulting in a cross-site scripting vulnerability. ## Proof of Concept ```js var init = i18n.init({debug: true}, function(){ var test = i18n.t('__firstName__ __lastName__', { escapeInterpolation: true, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'i18next'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16008'}, {'type': 'WEB', 'url': 'https://github.com/i18next/i18next/pull/443'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f89g-whpf-6q9m'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/325'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:06Z', 'nvd_published_at': None}
1.4.0
GHSA-hc9w-4p87-j549
2023-02-04T00:15:03Z
2018-11-07T20:46:25Z
null
['CVE-2018-16472']
Prototype Pollution in cached-path-relative
Version of `cached-path-relative` before 1.0.2 are vulnerable to prototype pollution. ## Recommendation Update to version 1.0.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'cached-path-relative'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16472'}, {'type': 'WEB', 'url': 'https://github.com/ashaffer/cached-path-relative/issues/3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390847'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hc9w-4p87-j549'}, {'type':...
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:57Z', 'nvd_published_at': '2018-11-06T19:29:00Z'}
1.4.0
GHSA-q8xj-8xg3-w432
2022-09-14T22:03:57Z
2018-11-09T17:41:35Z
null
['CVE-2018-18854']
Uncontrolled Resource Consumption in spray-json
Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of many JSON object fields (with keys that have the same hash code).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18854'}, {'type': 'WEB', 'url': 'https://github.com/spray/spray-json/issues/277'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q8xj-8xg3-w432'}, {'type': 'PACKAGE', 'url': 'https://github.com/spray/spray-jso'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:29Z', 'nvd_published_at': None}
1.4.0
GHSA-7hjp-97g3-rq93
2022-09-14T21:59:33Z
2018-11-01T14:47:04Z
null
['CVE-2018-18831']
Path Traversal in minsoft:ms-mcms
An issue was discovered in com\mingsoft\cms\action\GeneraterAction.java in MCMS 4.6.5. An attacker can write a .jsp file (in the position parameter) to an arbitrary directory via a ../ Directory Traversal in the url parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18831'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/IO0K0'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7hjp-97g3-rq93'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:53Z', 'nvd_published_at': None}
1.4.0
GHSA-w4x9-4f5x-8jj8
2020-06-16T21:59:37Z
2018-11-21T22:23:29Z
null
['CVE-2014-0228']
Low severity vulnerability that affects org.apache.hive:hive-exec, org.apache.hive:hive, and org.apache.hive:hive-service
Apache Hive before 0.13.1, when in SQL standards based authorization mode, does not properly check the file permissions for (1) import and (2) export statements, which allows remote authenticated users to obtain sensitive information via a crafted URI.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0228'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w4x9-4f5x-8jj8'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/hive-user/201406.mbox/%3CCABgNGzeN7E+9d=YV5yvnKA7wmSx1op_avtUjPcPtDaR6DLJM6g@mail.gmail.com%3...
{'cwe_ids': ['CWE-284'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:37Z', 'nvd_published_at': None}
1.4.0
GHSA-3rhm-67j6-42jq
2022-09-14T19:18:31Z
2018-11-09T17:50:40Z
null
['CVE-2017-18239']
Exposure of Sensitive information in authentikat-jwt
A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validatio...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.jason-goodwin:authentikat-jwt_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18239'}, {'type': 'WEB', 'url': 'https://github.com/jasongoodwin/authentikat-jwt/issues/12'}, {'type': 'WEB', 'url': 'https://github.com/jasongoodwin/authentikat-jwt/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/jasongoodwin/authentikat-jwt...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:11Z', 'nvd_published_at': None}
1.4.0
GHSA-f94m-mqhr-mc29
2022-09-14T22:04:18Z
2018-11-09T17:42:26Z
null
['CVE-2018-18853']
Uncontrolled Resource Consumption in spray-json when parsing decimal digit fields
Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of a field composed of many decimal digits.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18853'}, {'type': 'WEB', 'url': 'https://github.com/spray/spray-json/issues/278'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f94m-mqhr-mc29'}, {'type': 'PACKAGE', 'url': 'https://github.com/spray/spray-json'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:09Z', 'nvd_published_at': None}
1.4.0
GHSA-qv2v-m59f-v5fw
2021-09-16T21:04:32Z
2018-11-07T00:29:37Z
null
['CVE-2017-16031']
Insecure randomness in socket.io
Affected versions of `socket.io` depend on `Math.random()` to create socket IDs, and therefore the IDs are predictable. With enough information on prior IDs, an attacker may be able to guess the socket ID and gain access to socket.io servers without authorization. ## Recommendation Update to v0.9.7 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'socket.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16031'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io/issues/856'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io/pull/857'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be...
{'cwe_ids': ['CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:46Z', 'nvd_published_at': None}
1.4.0
GHSA-vqgp-4jgj-5j64
2023-09-01T10:05:11Z
2018-11-21T22:23:04Z
null
['CVE-2018-18920']
Py-EVM is vulnerable to arbitrary bytecode injection
Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without g...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'py-evm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0a33'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18920'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/py-evm/issues/1448'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vqgp-4jgj-5j64'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/py-evm'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:10Z', 'nvd_published_at': None}
1.4.0
GHSA-49qr-xh3w-h436
2023-09-05T18:42:33Z
2018-11-21T22:15:47Z
null
['CVE-2018-19351']
Jupyter Notebook XSS via untrusted notebooks
Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHandler and NbconvertPos...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19351'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-49qr-xh3w-h436'}, {'type': 'PACKAGE', 'url': 'https://github.com...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:00Z', 'nvd_published_at': None}
1.4.0
GHSA-hfj4-96f7-6r5g
2023-09-12T21:02:01Z
2018-11-09T17:49:11Z
null
['CVE-2017-0931']
Cross-Site Scripting in html-janitor
Versions of `html-janitor` prior to 2.0.2 (all current versions) are vulnerable to cross-site scripting (XSS). This is exploitable if user-controlled data is passed into the modules `clean()` function. ## Recommendation No fix is currently available for this vulnerability. It is recommended to use an alternative mo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'html-janitor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0931'}, {'type': 'WEB', 'url': 'https://github.com/guardian/html-janitor/issues/34'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/308155'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hfj4-96f7-6r5g'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:59Z', 'nvd_published_at': None}
1.4.0
GHSA-vxp9-wv2f-wqmw
2022-09-14T22:03:32Z
2018-11-09T17:40:56Z
null
['CVE-2018-8021']
Deserialization of Untrusted Data in superset
Versions of Superset prior to 0.23 used an unsafe load method from the pickle library to deserialize data leading to possible remote code execution. Note Superset 0.23 was released prior to any Superset release under the Apache Software Foundation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'superset'}, 'ecosystem_specific': {'affected_functions': ['superset.models.core.Dashboard.import_obj', 'superset.views.core.DashboardModelView.download_dashboards', 'superset.views.core.Superset.import_dashboards']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8021'}, {'type': 'WEB', 'url': 'https://github.com/apache/superset/pull/4243'}, {'type': 'WEB', 'url': 'https://github.com/apache/superset/commit/2c72a7ae4fc0a8bac1f037a79efa90e1c5549710'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/supe...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:58Z', 'nvd_published_at': None}
1.4.0
GHSA-5mhv-9qw8-j63g
2023-09-11T16:18:34Z
2018-11-09T17:43:03Z
null
['CVE-2017-16056']
mssql.js is malware
The `mssql.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mssql.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16056'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5mhv-9qw8-j63g'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/485'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:43Z', 'nvd_published_at': None}
1.4.0
GHSA-9fg5-f5pj-rwcc
2023-09-11T21:49:09Z
2018-11-09T17:43:52Z
null
['CVE-2017-16058']
gruntcli is malware
The `gruntcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'gruntcli'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16058'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9fg5-f5pj-rwcc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/498'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:20Z', 'nvd_published_at': None}
1.4.0
GHSA-9p47-w5xp-f4xr
2023-09-13T22:23:39Z
2018-11-09T17:48:37Z
null
['CVE-2017-16003']
windows-build-tools downloads Resources over HTTP
Affected versions of `windows-build-tools` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system runnin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'windows-build-tools'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16003'}, {'type': 'WEB', 'url': 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90'}, {'type': 'WEB', 'url': 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954...
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:09Z', 'nvd_published_at': None}
1.4.0
GHSA-83r3-c79w-f6wc
2021-09-03T22:28:49Z
2018-11-21T22:23:49Z
null
['CVE-2015-7521']
High severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
The authorization framework in Apache Hive 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.2.0 and 1.2.1, on clusters protected by Ranger and SqlStdHiveAuthorization, allows attackers to bypass intended parent table access restrictions via unspecified partition-level operations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.2...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7521'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-83r3-c79w-f6wc'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/hive-user/201601.mbox/%3C20160128205008.2154F185EB%40minotaur.apache.org%3E'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:07Z', 'nvd_published_at': None}
1.4.0
GHSA-3p8f-j2vw-7hw9
2023-09-07T22:49:48Z
2018-11-09T17:43:44Z
null
['CVE-2017-16059']
mssql-node is malware
The `mssql-node` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this module is malware, if you find it installed in your environment, the real security concern is determi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mssql-node'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16059'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3p8f-j2vw-7hw9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/480'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:41Z', 'nvd_published_at': None}
1.4.0
GHSA-q69p-5h74-w36f
2023-03-27T22:19:37Z
2018-11-09T17:48:34Z
null
['CVE-2017-1000043']
Content Injection via TileJSON Name in mapbox.js
Versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios. If `L.mapbox.map` or `L.mapbox.shareControl` are used in a manner that gives users control of the TileJSON content, it is possible to inject script content into the nam...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.4'}]}]}, {'package': {'ecosystem': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000043'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/99245'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q69p-5h74-w36f'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mapbox-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:13Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-r34r-f84j-5x4x
2021-09-17T14:13:37Z
2018-11-09T17:43:08Z
null
['CVE-2017-7678']
Moderate severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflecte...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fix...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7678'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r34r-f84j-5x4x'}, {'type': 'WEB', 'url': 'http://apache-spark-developers-list.1001551.n3.nabble.com/CVE-2017-7678-Apache-Spark-XSS-web-UI-MHTML-vulnerability-td21947.html'}, {'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:27Z', 'nvd_published_at': None}
1.4.0
GHSA-h29f-7f56-j8wh
2023-01-23T21:16:39Z
2018-02-20T19:23:20Z
null
['CVE-2018-7212']
Sinatra Path Traversal vulnerability
An issue was discovered in `rack-protection/lib/rack/protection/path_traversal.rb` in Sinatra 2.x before 2.0.1 on Windows. Path traversal is possible via backslash characters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sinatra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0.beta1'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7212'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/pull/1379'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/commit/6ad721abcfe36334108dcdd05d046c361e1b7a9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/sinatra/sin...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:23Z', 'nvd_published_at': None}
1.4.0
GHSA-2r9c-46v3-43fc
2021-01-08T20:59:00Z
2018-08-17T20:28:13Z
null
['CVE-2016-10688']
Downloads Resources over HTTP in haxe3
Affected versions of `haxe3` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe3`. #...
[]
[{'package': {'ecosystem': 'npm', 'name': 'haxe3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10688'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2r9c-46v3-43fc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/294'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:56Z', 'nvd_published_at': None}
1.4.0
GHSA-5p9f-55j8-922m
2020-06-17T15:14:35Z
2018-08-13T20:49:10Z
null
[]
Moderate severity vulnerability that affects doorkeeper
Withdrawn, accidental duplicate publish. The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '4.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6582'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5p9f-55j8-922m'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:35Z', 'nvd_published_at': None}
1.4.0
GHSA-9cp3-fh5x-xfcj
2023-03-31T15:44:11Z
2018-08-09T20:55:46Z
null
['CVE-2017-16098']
Regular Expression Denial of Service in charset
Affected versions of `charset` are susceptible to a regular expression denial of service. The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length. If node was compiled using the `-DHTTP_MAX_HEADER_SIZE` ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'charset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16098'}, {'type': 'WEB', 'url': 'https://github.com/node-modules/charset/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/node-modules/charset/pull/11'}, {'type': 'WEB', 'url': 'https://github.com/node-modules/charset/commit/effda0c48c51b47a...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:14Z', 'nvd_published_at': None}
1.4.0
GHSA-3fhf-6939-qg8p
2023-09-05T21:42:43Z
2018-08-13T20:47:22Z
null
['CVE-2015-1820']
rest-client Gem Vulnerable to Session Fixation
REST client for Ruby (aka rest-client) versions 1.6.1.a until 1.8.0 allow remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rest-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.1.a'}, {'fixed': '1.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1820'}, {'type': 'WEB', 'url': 'https://github.com/rest-client/rest-client/issues/369'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1205291'}, {'type': 'PACKAGE', 'url': 'https://github.com/rest-client/rest-client'}, {'type...
{'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:58Z', 'nvd_published_at': None}
1.4.0
GHSA-fv9m-f7w4-889c
2023-09-09T00:00:04Z
2018-08-06T21:43:03Z
null
['CVE-2017-16207']
discordi.js is malware
The `discordi.js` package is malware that attempts to discover and exfiltrate a user's [Discord](https://discordapp.com/) credentials, sending them to pastebin. All versions have been unpublished from the npm registry. ## Recommendation Do not install / use this module. It has been unpublished from the npm registry...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'discordi.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '14.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16207'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fv9m-f7w4-889c'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/545'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:18Z', 'nvd_published_at': None}
1.4.0
GHSA-j49g-mp79-5vm5
2023-09-07T18:25:01Z
2018-08-06T20:06:29Z
null
['CVE-2017-16203']
coffe-script is malware
The `coffe-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `coffe-script` installed in your environment, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'coffe-script'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16203'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j49g-mp79-5vm5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/543'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:58Z', 'nvd_published_at': None}
1.4.0
GHSA-22gq-x6pg-752j
2023-09-07T22:47:17Z
2018-08-29T23:45:41Z
null
['CVE-2017-16065']
openssl.js is malware
The `openssl.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'openssl.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16065'}, {'type': 'PACKAGE', 'url': 'https://github.com/DigitalArsenal/openssl.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/504'}]
{'cwe_ids': ['CWE-433', 'CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:50:52Z', 'nvd_published_at': None}
1.4.0
GHSA-hx46-vwmx-wx95
2021-12-02T23:14:01Z
2018-08-13T20:48:25Z
null
[]
High severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSY...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2098'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hx46-vwmx-wx95'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:51Z', 'nvd_published_at': None}
1.4.0
GHSA-cwp3-834g-x79g
2020-06-16T21:39:02Z
2018-08-21T17:07:36Z
null
[]
Moderate severity vulnerability that affects archive-tar-minitar and minitar
Withdrawn, accidental duplicate publish. Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a .. (dot dot) in a TAR archive entry.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'minitar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'archive-tar-minitar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10173'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cwp3-834g-x79g'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:06Z', 'nvd_published_at': None}
1.4.0
GHSA-2wpq-vvw6-67wr
2023-09-11T22:23:56Z
2018-08-29T23:38:35Z
null
['CVE-2017-16070']
nodecaffe is malware
The `nodecaffe` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodecaffe'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16070'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/509'}]
{'cwe_ids': ['CWE-433', 'CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:08Z', 'nvd_published_at': None}
1.4.0
GHSA-m3q7-rj8g-m457
2023-01-26T21:07:48Z
2018-08-28T22:33:24Z
null
['CVE-2015-7565']
ember-source Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in Ember.js 1.8.x through 1.10.x, 1.11.x before 1.11.4, 1.12.x before 1.12.2, 1.13.x before 1.13.12, 2.0.x before 2.0.3, 2.1.x before 2.1.2, and 2.2.x before 2.2.1 allows remote attackers to inject arbitrary web script or HTML.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.11.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7565'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ember-source/CVE-2015-7565.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:43Z', 'nvd_published_at': None}
1.4.0
GHSA-f599-5m7p-hcpf
2023-03-01T01:34:41Z
2018-08-13T20:45:32Z
null
['CVE-2018-3769']
grape subject to Cross-site Scripting
The grape rubygem suffers from a cross-site scripting (XSS) vulnerability via "format" parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'grape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3769'}, {'type': 'WEB', 'url': 'https://github.com/ruby-grape/grape/issues/1762'}, {'type': 'WEB', 'url': 'https://github.com/ruby-grape/grape/pull/1763'}, {'type': 'WEB', 'url': 'https://github.com/ruby-grape/grape/commit/6876b71efc7b03f7ce1be3f07...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:43Z', 'nvd_published_at': '2018-07-05T16:29:00Z'}
1.4.0
GHSA-3wxq-7r8m-qpmg
2023-09-07T18:33:27Z
2018-08-29T23:56:30Z
null
['CVE-2017-16068']
ffmepg is malware
The `ffmepg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determinin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ffmepg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16068'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3wxq-7r8m-qpmg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/507'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:46Z', 'nvd_published_at': None}
1.4.0
GHSA-gf7h-vg5v-cch6
2023-09-11T18:57:28Z
2018-08-06T20:03:21Z
null
['CVE-2017-16198']
Directory Traversal in ritp
Affected versions of `ritp` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ritp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16198'}, {'type': 'PACKAGE', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ritp'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/G...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:02Z', 'nvd_published_at': None}
1.4.0
GHSA-wqh4-27cc-j8f2
2023-09-11T18:31:53Z
2018-08-29T23:36:48Z
null
['CVE-2017-16069']
nodeffmpeg is malware
The `nodeffmpeg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodeffmpeg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16069'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wqh4-27cc-j8f2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/508'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:02Z', 'nvd_published_at': None}
1.4.0
GHSA-c9rj-pgxv-84jc
2023-09-08T21:32:49Z
2018-08-06T20:12:46Z
null
['CVE-2017-16206']
cofee-script is malware
The `cofee-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `cofee-script` installed in your environment, y...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'cofee-script'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16206'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c9rj-pgxv-84jc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/540'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:00Z', 'nvd_published_at': None}
1.4.0
GHSA-2pwf-xwr3-hp55
2021-12-02T23:14:26Z
2018-08-13T20:48:52Z
null
[]
Moderate severity vulnerability that affects actionview
Withdrawn, accidental duplicate publish. Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSY...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2097'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2pwf-xwr3-hp55'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:48Z', 'nvd_published_at': None}
1.4.0
GHSA-x489-jjwm-52g7
2023-07-05T20:45:12Z
2018-08-28T22:34:15Z
null
['CVE-2015-7225']
Tinfoil Devise-two-factor does not "burn" a successfully validated one-time password (OTP)
Tinfoil Devise-two-factor before 2.0.0 does not strictly follow [RFC 6238 § 5.2 ](https://datatracker.ietf.org/doc/html/rfc6238#section-5.2) and does not "burn" a successfully validated one-time password (aka OTP), which allows physically proximate attackers with a target user's login credentials to log in as said user...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'devise-two-factor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7225'}, {'type': 'WEB', 'url': 'https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466'}, {'type': 'ADVISORY', 'url': 'https://github.com/adv...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:02Z', 'nvd_published_at': None}
1.4.0
GHSA-5rc6-2r3r-fv79
2023-09-13T19:09:51Z
2018-08-15T19:25:47Z
null
['CVE-2016-10644']
slimerjs-edge downloads Resources over HTTP
Affected versions of `slimerjs-edge` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `sli...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'slimerjs-edge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10644'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5rc6-2r3r-fv79'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/243'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:16Z', 'nvd_published_at': None}
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
2