schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 14 228 | details stringlengths 48 1.45k | severity stringlengths 2 78 | affected stringlengths 79 6.96k | references stringlengths 143 6.38k | database_specific stringlengths 131 174 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-cpp2-q66x-fq44 | 2023-09-06T20:04:12Z | 2018-08-06T21:39:12Z | null | ['CVE-2017-16139'] | Directory Traversal in jikes | Affected versions of `jikes` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET... | [] | [{'package': {'ecosystem': 'npm', 'name': 'jikes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.0.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16139'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jikes'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cpp2-q66x-fq44'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advi... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4x37-5rh2-hp8c | 2023-09-11T16:17:57Z | 2018-08-29T23:50:59Z | null | ['CVE-2017-16067'] | node-opencv is malware | The `node-opencv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is deter... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-opencv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16067'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4x37-5rh2-hp8c'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/506'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2m39-62fm-q8r3 | 2023-01-31T01:55:03Z | 2018-08-15T13:22:23Z | null | ['CVE-2018-3737'] | Regular Expression Denial of Service in sshpk | Versions of `sshpk` before 1.13.2 or 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys.
## Recommendation
Update to version 1.13.2, 1.14.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'sshpk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3737'}, {'type': 'WEB', 'url': 'https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1bccf86d3efb2fb83c14e3f9957'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319593'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-... | {'cwe_ids': ['CWE-185', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:29Z', 'nvd_published_at': '2018-06-07T02:29:00Z'} |
1.4.0 | GHSA-cqxw-3p7v-p9gr | 2022-04-26T20:43:37Z | 2018-08-21T17:08:03Z | null | ['CVE-2016-10345'] | Phusion Passenger uses a known /tmp filename | In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10345'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441'}, {'type': 'WEB', 'url': 'https://blog.phusion.nl/2017/01/10/passenger-5-1-1/'}, {'type': 'ADVISORY', 'url': 'https://github.com/... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-562c-5r94-xh97 | 2023-08-07T16:04:04Z | 2018-08-23T19:10:40Z | null | ['CVE-2018-1000656'] | Flask is vulnerable to Denial of Service via incorrect encoding of JSON data | The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appear... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'flask'}, 'ecosystem_specific': {'affected_functions': ['flask.json.loads', 'flask.wrappers.Request.get_json']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000656'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/pull/2691'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/commit/b178e89e4456e777b1a7ac6d7199052d0dfdbbbe'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f523-2f5j-gfcg | 2023-09-13T19:38:19Z | 2018-08-29T23:04:14Z | null | ['CVE-2017-16115'] | Regular Expression Denial of Service in timespan | Affected versions of `timespan` are vulnerable to a regular expression denial of service when parsing dates.
The amplification for this vulnerability is significant, with 50,000 characters resulting in the event loop being blocked for around 10 seconds.
## Recommendation
No direct patch is available for this vulner... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'timespan'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16115'}, {'type': 'WEB', 'url': 'https://github.com/indexzero/TimeSpan.js/issues/10'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f523-2f5j-gfcg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/533'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gxpj-cx7g-858c | 2023-09-13T23:02:31Z | 2018-08-09T20:18:07Z | null | ['CVE-2017-16137'] | Regular Expression Denial of Service in debug | Affected versions of `debug` are vulnerable to regular expression denial of service when untrusted user input is passed into the `o` formatter.
As it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue.
## Recommendation
Version 2.x.x: Update to version 2.6.9 or later.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'debug'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.9'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'debug'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECO... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16137'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/debug/issues/501'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/debug/pull/504'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gxpj-cx7g-858c'}, {'type': ... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-72hv-rp4q-q7f3 | 2023-09-11T18:38:16Z | 2018-08-29T23:57:14Z | null | ['CVE-2017-16060'] | babelcli is malware | The `babelcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'babelcli'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16060'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-72hv-rp4q-q7f3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/499'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8wg9-92fr-6j7v | 2023-09-07T18:18:38Z | 2018-08-15T18:50:31Z | null | ['CVE-2016-10648'] | marionette-socket-host downloads Resources over HTTP | Affected versions of `marionette-socket-host` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system run... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'marionette-socket-host'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10648'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8wg9-92fr-6j7v'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla-b2g/marionette-socket-host'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/252'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9wv8-jgw4-4g28 | 2020-06-16T21:33:56Z | 2018-08-15T20:04:13Z | 2020-06-16T21:29:46Z | [] | High severity vulnerability that affects festivaltts4r | Withdrawn, accidental duplicate publish.
The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) to_speech or (2) to_mp3 method in lib/festivaltts4r/festival4r.rb. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'festivaltts4r'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10194'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9wv8-jgw4-4g28'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ph8p-2g97-9654 | 2021-01-08T18:21:22Z | 2018-08-15T19:27:25Z | null | ['CVE-2016-10643'] | Downloads Resources over HTTP in jstestdriver | Affected versions of `jstestdriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jste... | [] | [{'package': {'ecosystem': 'npm', 'name': 'jstestdriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10643'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ph8p-2g97-9654'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/244'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vcfp-ppqw-mf23 | 2023-09-11T18:26:51Z | 2018-08-17T20:20:46Z | null | ['CVE-2016-10686'] | fis-sass-all downloads Resources over HTTP | Affected versions of `fis-sass-all` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'fis-sass-all'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10686'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vcfp-ppqw-mf23'}, {'type': 'PACKAGE', 'url': 'https://github.com/fis-dev/fis-sass'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/287'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vv6q-9cfw-4c83 | 2023-09-12T18:30:03Z | 2018-08-29T23:20:27Z | null | ['CVE-2017-16079'] | smb is malware | The `smb` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining h... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'smb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16079'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vv6q-9cfw-4c83'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/518'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pxqr-8v54-m2hj | 2023-07-04T00:05:37Z | 2018-08-08T22:30:35Z | null | ['CVE-2016-10522'] | Cross-site request forgery in rails_admin | rails_admin ruby gem <v1.1.1 is vulnerable to cross-site request forgery (CSRF) attacks. Non-GET methods were not validating CSRF tokens and, as a result, an attacker could hypothetically gain access to the application administrative endpoints exposed by the gem. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails_admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10522'}, {'type': 'WEB', 'url': 'https://github.com/railsadminteam/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pxqr-8v54-m2hj'}, {'type': 'PACKAGE', 'url': 'https://... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x7q3-67vc-wvcf | 2023-09-13T22:57:47Z | 2018-08-15T19:05:14Z | null | ['CVE-2016-10645'] | grunt-images downloads Resources over HTTP | Affected versions of `grunt-images` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grun... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'grunt-images'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10645'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x7q3-67vc-wvcf'}, {'type': 'PACKAGE', 'url': 'https://github.com/gcpantazis/grunt-images'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/255'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4j59-hfw6-6w7h | 2021-09-16T20:54:42Z | 2018-08-15T19:30:48Z | null | ['CVE-2016-10642'] | Downloads Resources over HTTP in cmake | Affected versions of `cmake` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cmake`.
#... | [] | [{'package': {'ecosystem': 'npm', 'name': 'cmake'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10642'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4j59-hfw6-6w7h'}, {'type': 'PACKAGE', 'url': 'https://github.com/stanley-gu/cmake'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/233'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-694m-jhr9-pf77 | 2023-01-21T03:36:04Z | 2018-08-13T20:46:41Z | null | ['CVE-2018-1000211'] | Doorkeeper subject to Incorrect Permission Assignment | Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000211'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/issues/891'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/pull/1119'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-694m-jhr... | {'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m2q3-53fq-7h66 | 2023-03-14T20:41:45Z | 2018-08-28T22:33:51Z | null | ['CVE-2015-7314'] | Gollum Exposure of Sensitive Information | The Precious module in gollum before 4.0.1 allows remote attackers to read arbitrary files by leveraging the lack of a certain temporary-file check. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'gollum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7314'}, {'type': 'WEB', 'url': 'https://github.com/gollum/gollum/issues/1070'}, {'type': 'WEB', 'url': 'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1'}, {'type': 'PACKAGE', 'url': 'https://github.com/gollum/gollum... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f499-jv47-9wxf | 2023-09-06T20:04:27Z | 2018-08-06T21:40:02Z | null | ['CVE-2017-16164'] | Directory Traversal in desafio | Affected versions of `desafio` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
G... | [] | [{'package': {'ecosystem': 'npm', 'name': 'desafio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16164'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/desafio'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f499-jv47-9wxf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/ad... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-36p7-xjw8-h6f2 | 2023-08-28T10:31:36Z | 2018-08-21T17:08:30Z | null | ['CVE-2016-5697'] | Ruby-saml allows attackers to perform XML signature wrapping attacks | ruby-saml prior to version 1.3.0 is vulnerable to an XML signature wrapping attack in the specific scenario where there was a signature that referenced at the same time 2 elements (but past the scheme validator process since 1 of the element was inside the encrypted assertion).
ruby-saml users must update to 1.3.0, whi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-saml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5697'}, {'type': 'WEB', 'url': 'https://github.com/onelogin/ruby-saml/commit/a571f52171e6bfd87db59822d1d9e8c38fb3b995'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-saml/CVE-2016-5697.yml'}, {'type': 'W... | {'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-82x2-g7vr-39wq | 2020-06-17T15:14:38Z | 2018-08-13T20:48:09Z | 2020-06-17T15:14:38Z | [] | Moderate severity vulnerability that affects web-console | Withdrawn, accidental duplicate publish.
request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted req... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'web-console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3224'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-82x2-g7vr-39wq'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pv4c-p2j5-38j4 | 2023-09-11T22:06:04Z | 2018-08-13T15:02:15Z | null | ['CVE-2018-3774'] | Open Redirect in url-parse | Versions of `url-parse` before 1.4.3 returns the wrong hostname which could lead to Open Redirect, Server Side Request Forgery (SSRF), or Bypass Authentication Protocol vulnerabilities.
## Recommendation
Update to version 1.4.3 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3774'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/53b1794e54d0711ceb52505e0f74145270570d5a'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/d7b582ec1243e8024e60ac0b62d2569c939ef5de'}, {'type': 'WE... | {'cwe_ids': ['CWE-425'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w655-w578-99pq | 2020-06-17T15:15:17Z | 2018-08-21T17:09:08Z | 2020-06-17T15:15:17Z | [] | High severity vulnerability that affects espeak-ruby | Withdrawn, accidental duplicate publish.
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'espeak-ruby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10193'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w655-w578-99pq'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8474-rc7c-wrhp | 2020-06-17T15:14:40Z | 2018-08-08T22:29:10Z | 2020-06-17T15:14:40Z | [] | High severity vulnerability that affects safemode | Withdrawn, accidental duplicate publish.
The safemode rubygem, as used in Foreman, versions 1.3.2 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7540'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8474-rc7c-wrhp'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fr52-4hqw-p27f | 2022-04-26T18:24:04Z | 2018-08-21T19:03:26Z | null | ['CVE-2016-4658'] | Nokogiri does not forbid namespace nodes in XPointer ranges | xpointer.c in libxml2 before 2.9.5 (as used in nokogiri before 1.7.1 amongst other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4658'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-37'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT20... | {'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mp78-r56v-45qc | 2023-08-29T11:29:21Z | 2018-08-28T22:34:31Z | null | ['CVE-2015-1866'] | ember-source vulnerable to Cross-site Scripting | Cross-site scripting (XSS) vulnerability in Ember.js 1.10.x before 1.10.1 and 1.11.x before 1.11.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.1'}]}], 'versions': ['1.10.0']}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1866'}, {'type': 'WEB', 'url': 'https://emberjs.com/blog/2015/04/14/security-and-bugfix-releases-ember-1-10-1-1-11-2-1-11-3.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/Acidburn0zzz/ember.js'}, {'type': 'WEB', 'url': 'https://github.com/r... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2j55-pcw5-x4h2 | 2023-01-18T21:33:05Z | 2018-08-13T15:02:49Z | null | ['CVE-2018-3779'] | active-support impersonates 'activesupport' gem | The `active-support` ruby gem gem is malware and duplicates the official `activesupport` (no hyphen) gem, but adds a compiled extension. The extension attempts to resolve a base64 encoded domain (29faea63.planfhntage.de), downloads a payload, and executes.
This trojan horse gem could allow a remote attacker to execut... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'active-support'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3779'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/392311'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2j55-pcw5-x4h2'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7322-9mx6-5j2m | 2023-01-23T20:45:35Z | 2018-08-15T20:04:30Z | null | ['CVE-2015-5147'] | redcarpet Buffer Overflow vulnerability | Stack-based buffer overflow in the `header_anchor` function in the HTML renderer in Redcarpet before 3.3.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'redcarpet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5147'}, {'type': 'WEB', 'url': 'https://github.com/vmg/redcarpet/commit/2cee777c1e5babe8a1e2683d31ea75cc4afe55fb'}, {'type': 'PACKAGE', 'url': 'https://github.com/vmg/redcarpet'}, {'type': 'WEB', 'url': 'https://github.com/vmg/redcarpet/blob/master... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-995j-587r-259w | 2020-06-16T21:42:03Z | 2018-08-13T20:46:58Z | 2020-06-16T21:28:00Z | [] | Moderate severity vulnerability that affects rack-mini-profiler | Withdrawn, accidental duplicate publish.
The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack-mini-profiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4442'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-995j-587r-259w'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9wcm-rrvh-qjc8 | 2020-06-17T15:14:43Z | 2018-08-15T20:03:53Z | 2020-06-17T15:14:43Z | [] | High severity vulnerability that affects colorscore | Withdrawn, accidental duplicate publish.
The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'colorscore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9wcm-rrvh-qjc8'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hm48-76wh-q86v | 2020-06-17T15:14:48Z | 2018-08-21T19:03:17Z | 2020-06-17T15:14:48Z | [] | High severity vulnerability that affects activerecord | Withdrawn, accidental duplicate publish.
activerecord/lib/active_record/relation/query_methods.rb in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes create_with calls. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3514'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hm48-76wh-q86v'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4q53-fqhc-cr46 | 2023-08-29T10:51:34Z | 2018-08-28T22:33:42Z | null | ['CVE-2014-0046'] | ember-source Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in the link-to helper in Ember.js 1.2.x before 1.2.2, 1.3.x before 1.3.2, and 1.4.x before 1.4.0-beta.6, when used in non-block form, allows remote attackers to inject arbitrary web script or HTML via the title attribute. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': [''... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0046'}, {'type': 'WEB', 'url': 'https://github.com/emberjs/ember.js/commit/45ee8df2a0efc0afe233d6b9b17045782a2e6b2d'}, {'type': 'WEB', 'url': 'https://github.com/emberjs/ember.js/commit/94b28b8773acf894c4d7d7fccf4411a706292436'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:44Z', 'nvd_published_at': '2014-02-27T15:55:00Z'} |
1.4.0 | GHSA-8225-6cvr-8pqp | 2023-09-08T23:55:11Z | 2018-08-09T20:13:01Z | null | ['CVE-2017-16129'] | superagent vulnerable to zip bomb attacks | Affected versions of `superagent` do not check the post-decompression size of ZIP compressed HTTP responses prior to decompressing. This results in the package being vulnerable to a [ZIP bomb](https://en.wikipedia.org/wiki/Zip_bomb) attack, where an extremely small ZIP file becomes many orders of magnitude larger when ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'superagent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16129'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/superagent/issues/1259'}, {'type': 'WEB', 'url': 'https://en.wikipedia.org/wiki/Zip_bomb'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8225-6cvr-8pqp'}, {'type': '... | {'cwe_ids': ['CWE-400', 'CWE-409'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wqg7-vrj7-v82h | 2023-09-07T22:27:31Z | 2018-08-31T06:22:50Z | null | ['CVE-2018-11615'] | Mosca REDoS Vulnerability | This vulnerability allows remote attackers to deny service on vulnerable installations of npm mosca 2.8.1. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of topics. A crafted regular expression can cause the broker to crash. An attacker can leverage this vul... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mosca'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11615'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wqg7-vrj7-v82h'}, {'type': 'WEB', 'url': 'https://zerodayinitiative.com/advisories/ZDI-18-583'}] | {'cwe_ids': ['CWE-185', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-534w-937m-v7x3 | 2023-06-09T20:17:46Z | 2018-08-03T21:04:02Z | null | ['CVE-2018-3777'] | restforce vulnerable to Improper Input Validation | A flaw in how restforce constructs URLs may allow an attacker to inject additional parameters into Salesforce API requests.
Impact
------
This flaw is only exploitable in applications that pass user input directly to restforce's select, find, describe, update, upsert, and destroy methods.
Vulnerable code might lo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'restforce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3777'}, {'type': 'WEB', 'url': 'https://github.com/restforce/restforce/pull/392'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-534w-937m-v7x3'}, {'type': 'PACKAGE', 'url': 'https://github.com/restforce/restforce'}, {'type': 'WEB... | {'cwe_ids': ['CWE-172', 'CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:51Z', 'nvd_published_at': '2018-08-03T20:29:00Z'} |
1.4.0 | GHSA-xrr4-74mc-rpjc | 2022-04-26T18:22:26Z | 2018-08-21T17:01:29Z | null | ['CVE-2011-2765'] | Pyro mishandles pid files in temporary directory locations and opening the pid file as root | pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2765'}, {'type': 'WEB', 'url': 'https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/631912'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xrr4-74mc-rp... | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xjqg-9jvg-fgx2 | 2023-03-13T23:53:36Z | 2018-08-21T19:03:04Z | null | ['CVE-2015-5312'] | Nokogiri subject to DoS via libxml2 vulnerability | The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 (as used in nokogiri before 1.6.7.1) does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.7.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5312'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1276693'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e'}, {'type': 'WEB', 'url': 'https://github.com/ru... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6fjr-m7v6-fpg9 | 2023-09-06T18:29:27Z | 2018-08-06T21:41:38Z | null | ['CVE-2017-16204'] | jquey is malware | The `jquey` package is malware that attempts to discover and exfiltrate sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `jquey` installed in your environmen... | [] | [{'package': {'ecosystem': 'npm', 'name': 'jquey'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16204'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6fjr-m7v6-fpg9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/544'}] | {'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m6wh-m8m8-6xx5 | 2023-09-06T20:07:33Z | 2018-08-06T20:05:28Z | null | ['CVE-2017-16202'] | cofeescript is malware | The `cofeescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `cofeescript` installed in your environment, you... | [] | [{'package': {'ecosystem': 'npm', 'name': 'cofeescript'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16202'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m6wh-m8m8-6xx5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/541'}] | {'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hg4c-rgvm-964g | 2021-12-02T23:19:05Z | 2018-08-15T20:02:53Z | null | ['CVE-2016-8640'] | SQL Injection in pycsw | A SQL injection vulnerability in pycsw all versions before 2.0.2, 1.10.5 and 1.8.6 that leads to read and extract of any data from any table in the pycsw database that the database user has access to. Also on PostgreSQL (at least) it is possible to perform updates/inserts/deletes and database modifications to any table... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pycsw'}, 'ecosystem_specific': {'affected_functions': ['pycsw.ogc.csw.csw2.Csw2.getrecords']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pycsw'}, 'ecosystem_specific': {'affected_fun... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8640'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pycsw/pull/474/files'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pycsw/commit/522873e5ce48bb9cbd4e7e8168ca881ce709c222'}, {'type': 'WEB', 'url': 'https://github.com/geopython/... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-44vc-fpcg-5cc5 | 2020-06-16T21:30:40Z | 2018-08-08T22:29:49Z | 2020-06-16T20:57:19Z | [] | Moderate severity vulnerability that affects safemode | Withdrawn, accidental duplicate publish.
The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3693'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-44vc-fpcg-5cc5'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xh56-3f5w-9h25 | 2023-09-07T18:51:58Z | 2018-08-29T23:40:01Z | null | ['CVE-2017-16071'] | nodemailer-js is malware | The `nodemailer-js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is det... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodemailer-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16071'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xh56-3f5w-9h25'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/510'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2hxv-mx8x-mcj9 | 2023-08-28T10:47:48Z | 2018-08-28T22:34:22Z | null | ['CVE-2015-4619'] | Spina gem vulnerable to Cross-site request forgery (CSRF) vulnerability | Cross-site request forgery (CSRF) vulnerability in Spina before commit bfe44f289e336f80b6593032679300c493735e75. `Spina::ApplicationController` actions didn't have CSRF protection. This causes a CSRF vulnerability across the entire engine which includes administrative functionality such as creating users, changing pass... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'spina'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.29'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4619'}, {'type': 'WEB', 'url': 'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75'}, {'type': 'PACKAGE', 'url': 'https://github.com/denkGroot/Spina'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q7wx-62r7-j2x7 | 2023-03-14T19:07:20Z | 2018-08-08T22:31:12Z | null | ['CVE-2015-1819'] | Nokogiri vulnerable to libxml XML Entity Expansion | The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.6.0'}, {'fixed': '1.6.6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.6.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1819'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1374'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=213f1fe0d76d30eaed6e5853057defc43e6df2c9'}, {'type': 'WEB', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rp28-29ch-gh92 | 2023-09-08T23:13:40Z | 2018-08-06T21:30:15Z | null | ['CVE-2017-16222'] | Directory Traversal in elding | Affected versions of `elding` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
This vulnerability only affects... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'elding'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16222'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/elding'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rp28-29ch-gh92'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/adv... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j866-8vxx-27hx | 2023-09-08T23:02:21Z | 2018-08-29T23:43:53Z | null | ['CVE-2017-16072'] | nodemailer.js is malware | The `nodemailer.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is det... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodemailer.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16072'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j866-8vxx-27hx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/511'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4g54-95xv-f353 | 2023-09-11T18:34:27Z | 2018-08-29T23:16:56Z | null | ['CVE-2017-16075'] | http-proxy.js is malware | The `http-proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is det... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'http-proxy.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16075'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4g54-95xv-f353'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/514'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2gw2-8q9w-cw8p | 2023-01-25T22:55:50Z | 2018-08-31T14:55:43Z | null | ['CVE-2018-1000201'] | Ruby-ffi has a DLL loading issue | ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ffi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.24'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000201'}, {'type': 'WEB', 'url': 'https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a'}, {'type': 'WEB', 'url': 'https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c'}, {'type': 'PACKAGE', 'url': 'https... | {'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4cmx-hrq9-c23p | 2023-04-21T18:30:53Z | 2018-08-15T20:03:22Z | null | ['CVE-2018-3778'] | Improper Authorization in aedes | Versions of `aedes` before 0.35.1 does not respect its own authorization rules when a client sets a `Last Will`.
## Recommendation
Update to version 0.35.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'aedes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.35.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3778'}, {'type': 'WEB', 'url': 'https://github.com/moscajs/aedes/issues/211'}, {'type': 'WEB', 'url': 'https://github.com/moscajs/aedes/issues/212'}, {'type': 'WEB', 'url': 'https://github.com/moscajs/aedes/commit/ffbc1702bb24b596afbb96407cc6db234a... | {'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:11Z', 'nvd_published_at': '2018-08-08T20:29:00Z'} |
1.4.0 | GHSA-phmw-pv3f-vvx7 | 2021-12-02T23:09:12Z | 2018-08-13T20:47:44Z | 2020-06-17T15:14:58Z | [] | Moderate severity vulnerability that affects paperclip | Withdrawn, accidental duplicate publish.
The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'paperclip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2963'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-phmw-pv3f-vvx7'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/paperclip'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-72fg-jqhx-c68p | 2023-09-11T18:37:42Z | 2018-08-06T21:33:31Z | null | ['CVE-2017-16224'] | Open Redirect in st | st is a module for serving static files.
An attacker is able to craft a request that results in an `HTTP 301` (redirect) to an entirely different domain.
A request for: `http://some.server.com//nodesecurity.org/%2e%2e` would result in a 301 to `//nodesecurity.org/%2e%2e` which most browsers treat as a proper redirec... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'st'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16224'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-72fg-jqhx-c68p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/547'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8gg6-3r63-25m8 | 2023-08-29T12:09:29Z | 2018-08-15T20:03:37Z | null | ['CVE-2015-8968'] | git-fastclone permits arbitrary shell command execution from .gitmodules | git-fastclone before 1.0.1 permits arbitrary shell command execution from .gitmodules. If an attacker can instruct a user to run a recursive clone from a repository they control, they can get a client to run an arbitrary shell command. Alternately, if an attacker can MITM an unencrypted git clone, they could exploit th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'git-fastclone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8968'}, {'type': 'WEB', 'url': 'https://github.com/square/git-fastclone/pull/2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/104465'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/git-fastclone/CVE... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8h55-49jm-739x | 2023-09-11T16:34:56Z | 2018-08-29T23:21:46Z | null | ['CVE-2017-16109'] | Directory Traversal in easyquick | Affected versions of `easyquick` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'easyquick'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16109'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/easyquick'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8h55-49jm-739x'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-38f5-ghc2-fcmv | 2023-09-12T18:38:55Z | 2018-08-21T17:02:43Z | null | ['CVE-2018-3784'] | Code Injection in cryo | All versions of `cryo` are vulnerable to code injection due to an Insecure implementation of deserialization.
## Proof of concept
```js
var Cryo = require('cryo');
var frozen = '{"root":"_CRYO_REF_3","references":[{"contents":{},"value":"_CRYO_FUNCTION_function () {console.log(\\"defconrussia\\"); return 1111;}"},{"... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'cryo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3784'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/350418'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38f5-ghc2-fcmv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/690'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5mjw-6jrh-hvfq | 2023-09-11T16:18:58Z | 2018-08-06T21:37:06Z | null | ['CVE-2017-16226'] | Sandbox Breakout / Arbitrary Code Execution in static-eval | Affected versions of `static-eval` pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package.
## Proof of concept
```js
var evaluate = require('static-eval');
var parse = require('esprima').parse;
var src = '(... | [] | [{'package': {'ecosystem': 'npm', 'name': 'static-eval'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16226'}, {'type': 'WEB', 'url': 'https://github.com/substack/static-eval/pull/18'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5mjw-6jrh-hvfq'}, {'type': 'WEB', 'url': 'https://maustin.net/articles/2017-10/static_eval'}, {'type... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p65h-233c-jxvm | 2021-01-08T18:23:55Z | 2018-08-15T19:03:59Z | null | ['CVE-2016-10646'] | Downloads Resources over HTTP in resourcehacker | Affected versions of `resourcehacker` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `re... | [] | [{'package': {'ecosystem': 'npm', 'name': 'resourcehacker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10646'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p65h-233c-jxvm'}, {'type': 'WEB', 'url': 'https://github.com/felicienfrancois/node-resourcehacker/blob/master/scripts/install.js#L4'}, {'type': 'WEB', 'url': 'https://www.npmj... | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mf6w-45cf-qhmp | 2023-01-26T21:13:16Z | 2018-08-15T20:04:44Z | null | ['CVE-2015-8969'] | Git-fastclone passes user modifiable strings directly to a shell command | git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to `cd ` and `git clone ` commands in the library. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'git-fastclone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8969'}, {'type': 'WEB', 'url': 'https://github.com/square/git-fastclone/pull/5'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/105190'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/git-fastclone/CVE... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5hxw-r847-qfwp | 2023-09-07T18:31:39Z | 2018-08-29T23:47:07Z | null | ['CVE-2017-16066'] | opencv.js is malware | opencv.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'opencv.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16066'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5hxw-r847-qfwp'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hv9c-qwqg-qj3v | 2022-08-02T18:03:09Z | 2018-08-23T19:12:08Z | null | ['CVE-2018-15685'] | Electron webPreferences vulnerability can be used to perform remote code execution | GitHub Electron 1.7.15, 1.8.7, 2.0.7, and 3.0.0-beta.6, in certain scenarios involving IFRAME elements and "nativeWindowOpen: true" or "sandbox: true" options, is affected by a webPreferences vulnerability that can be leveraged to perform remote code execution.
More information to determine if you are impacted can be ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.16'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.8'}]}]}, {'package': {'ecosystem'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15685'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/519a02d8d4d28e8a467acb40fb26172a80c9454f'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/80221e52d93a96ea704cb6748ead669c55cff504'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-1188'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h3c2-x77c-7pvr | 2023-02-03T20:44:46Z | 2018-08-21T17:03:33Z | null | ['CVE-2018-3785'] | Command Injection in git-dummy-commit | A command injection in git-dummy-commit v1.3.0 allows os level commands to be executed due to an unescaped parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'git-dummy-commit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3785'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/341710'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h3c2-x77c-7pvr'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:34Z', 'nvd_published_at': '2018-08-17T13:29:00Z'} |
1.4.0 | GHSA-36vc-cw62-fqvr | 2023-09-05T22:35:19Z | 2018-08-27T19:07:23Z | null | ['CVE-2017-16078'] | Shadowsock is malware | The `shadowsock` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is deter... | [] | [{'package': {'ecosystem': 'npm', 'name': 'shadowsock'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16078'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-36vc-cw62-fqvr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/517'}] | {'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qj73-v688-wqxf | 2020-08-31T18:26:04Z | 2018-08-29T23:19:13Z | null | ['CVE-2017-16076'] | Hijacked Environment Variables in proxy.js | The `proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determi... | [] | [{'package': {'ecosystem': 'npm', 'name': 'proxy.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16076'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qj73-v688-wqxf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/515'}] | {'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8f64-q7jc-ccgp | 2023-01-31T01:53:19Z | 2018-08-08T22:25:57Z | null | ['CVE-2018-3773'] | metascraper before v5.2.0 vulnerable to stored cross-site scripting | Versions of `metascraper` prior to 5.2.0 are vulnerable to stored cross-site scripting (XSS).
## Recommendation
Upgrade to version 5.2.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'metascraper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3773'}, {'type': 'WEB', 'url': 'https://github.com/microlinkhq/metascraper/pull/169'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/309367'}, {'type': 'PACKAGE', 'url': 'https://github.com/microlinkhq/metascraper'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:23Z', 'nvd_published_at': '2018-07-30T18:29:00Z'} |
1.4.0 | GHSA-mc9x-v9xg-25pm | 2023-09-12T18:43:18Z | 2018-08-06T20:12:54Z | null | ['CVE-2017-16205'] | coffescript is malware | The `coffescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `coffescript` installed in your environment, yo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'coffescript'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16205'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mc9x-v9xg-25pm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/542'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hgg3-g7gr-66r7 | 2023-08-08T10:35:15Z | 2018-08-27T19:52:28Z | null | ['CVE-2018-15560'] | PyCryptodome Integer overflow vulnerability | PyCryptodome before 3.6.6 has an integer overflow in the data_len variable in AESNI.c, related to the AESNI_encrypt and AESNI_decrypt functions, leading to the mishandling of messages shorter than 16 bytes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pycryptodome'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15560'}, {'type': 'WEB', 'url': 'https://github.com/Legrandin/pycryptodome/issues/198'}, {'type': 'PACKAGE', 'url': 'https://github.com/Legrandin/pycryptodome'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hgg3-g7gr-66r7'}, {'ty... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m8h6-m9p5-p2f8 | 2021-12-02T23:15:03Z | 2018-08-13T20:49:01Z | 2020-06-16T21:45:29Z | [] | Moderate severity vulnerability that affects activerecord | Withdrawn, accidental duplicate publish.
Active Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.7.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6317'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m8h6-m9p5-p2f8'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c2m4-w5hm-vqjw | 2023-09-13T22:48:21Z | 2018-08-29T23:05:46Z | null | ['CVE-2017-16074'] | crossenv is malware | The `crossenv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'crossenv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16074'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c2m4-w5hm-vqjw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/513'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jhq3-57xh-6643 | 2021-09-14T19:42:55Z | 2018-08-21T17:03:59Z | null | ['CVE-2018-3783'] | Privilege Escalation due to Blind NoSQL Injection in flintcms | Versions of `flintcms` before version 1.1.10 are vulnerable to account takeover due to blind MongoDB injection in the password reset.
## Recommendation
Update to version 1.1.10 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'flintcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3783'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/386807'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhq3-57xh-6643'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/689'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gvpx-9459-w3mj | 2021-09-13T13:35:54Z | 2018-05-23T20:37:46Z | null | ['CVE-2018-11093'] | Cross-Site Scripting in @ckeditor/ckeditor5-link | Versions of `status-board` prior to 10.0.1 are vulnerable to Cross-Site Scripting. The `_createPreviewButton()` function fails to sanitize the `href` attribute of a created `<a>` tag. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 10.0.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-link'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '10.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11093'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5-link/commit/8cb782eceba10fc481e4021cb5d25b2a85d1b04e'}, {'type': 'WEB', 'url': 'https://ckeditor.com/blog/CKEditor-5-v10.0.1-released/'}, {'type': 'ADVISORY', 'url': 'https://gi... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-43fp-vwwg-qgv6 | 2023-09-11T20:45:18Z | 2018-12-20T22:02:32Z | null | ['CVE-2018-17194'] | Apache NiFi Improper Input Validation vulnerability | When a client request to a cluster node was replicated to other nodes in the cluster for verification, the Content-Length was forwarded. On a DELETE request, the body was ignored, but if the initial request had a Content-Length value other than 0, the receiving nodes would wait for the body and eventually timeout. Miti... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-framework-cluster'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17194'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/1baead6f525046a613fc4fe494a0d193776ea70f,'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4qq9-rrq6-48ff | 2021-09-01T18:01:38Z | 2018-12-20T22:02:39Z | null | ['CVE-2018-17193'] | Moderate severity vulnerability that affects org.apache.nifi:nifi | The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should u... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17193'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4qq9-rrq6-48ff'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018-17193'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5p52-j8pw-j7x5 | 2022-09-14T22:12:54Z | 2018-12-19T19:24:52Z | null | ['CVE-2018-20000'] | Improper Restriction of XML External Entity Reference in bedework:bw-webdav | Apereo Bedework bw-webdav before 4.0.3 allows XXE attacks, as demonstrated by an invite-reply document that reads a local file, related to webdav/servlet/common/MethodBase.java and webdav/servlet/common/PostRequestPars.java. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bedework:bw-webdav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20000'}, {'type': 'WEB', 'url': 'https://github.com/Bedework/bw-webdav/pull/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bedework/bw-webdav'}, {'type': 'WEB', 'url': 'https://github.com/Bedework/bw-webdav/compare/bw-webdav-4.0.2...bw-webdav-... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jxm5-5xcw-h57q | 2022-11-15T16:07:28Z | 2018-12-20T22:02:17Z | null | ['CVE-2018-1000823'] | exist-db:exist-core XML External Entity (XXE) vulnerability | exist version <= 5.0.0-RC4 contains a XML External Entity (XXE) vulnerability in XML Parser for REST Server that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.exist-db:exist-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000823'}, {'type': 'WEB', 'url': 'https://github.com/eXist-db/exist/issues/2180'}, {'type': 'WEB', 'url': 'https://github.com/eXist-db/exist/pull/2243'}, {'type': 'WEB', 'url': 'https://github.com/eXist-db/exist/pull/2247'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cq27-v7xp-c356 | 2022-09-14T22:11:10Z | 2018-12-14T18:51:38Z | null | ['CVE-2013-7459'] | Buffer Overflow in pycrypto | Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pycrypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7459'}, {'type': 'WEB', 'url': 'https://github.com/dlitz/pycrypto/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bu... | {'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mr4x-c4v9-x729 | 2023-08-30T23:20:56Z | 2018-12-20T22:01:46Z | null | ['CVE-2018-1000814'] | aiohttp-session creates non-expiring sessions | aio-libs aiohttp-session version 2.6.0 and earlier contains a Other/Unknown vulnerability in EncryptedCookieStorage and NaClCookieStorage that can result in Non-expiring sessions / Infinite lifespan. This attack appear to be exploitable via Recreation of a cookie post-expiry with the same value. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'aiohttp-session'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000814'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/issues/325'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/pull/331'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/pull/33... | {'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xmvg-w4f9-99r7 | 2022-09-14T22:23:07Z | 2018-12-20T22:02:51Z | null | ['CVE-2018-1000836'] | XML External Entity (XXE) vulnerability in bw-calendar-engine | bw-calendar-engine version <= bw-calendar-engine-3.12.0 contains a XML External Entity (XXE) vulnerability in IscheduleClient XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via Man in the Middle or malicious server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bedework.caleng:bw-calendar-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.12.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000836'}, {'type': 'WEB', 'url': 'https://github.com/Bedework/bw-calendar-engine/issues/3'}, {'type': 'WEB', 'url': 'https://0dd.zone/2018/10/28/bw-calendar-engine-XXE-MitM/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bedework/bw-calendar-en... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9448-c9wq-jg9v | 2022-09-14T22:28:00Z | 2018-12-21T17:49:33Z | null | ['CVE-2018-11786'] | Improper Privilege Management in Apache Karaf | In Apache Karaf prior to 4.2.0 release, if the sshd service in Karaf is left on so an administrator can manage the running instance, any user with rights to the Karaf console can pivot and read/write any file on the file system to which the Karaf process user has access. This can be locked down a bit by using chroot to... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11786'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9448-c9wq-jg9v'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/KARAF-5427'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5b7ac762c6bbe77ac5d9... | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wg5w-vv93-3f7w | 2021-09-21T19:44:14Z | 2018-12-20T22:01:18Z | null | ['CVE-2018-11799'] | Moderate severity vulnerability that affects org.apache.oozie:oozie-core | Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user's name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.oozie:oozie-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11799'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wg5w-vv93-3f7w'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/347e7a8cb86014b7ca37e49eb00b8d088203bdc0bcfb4799f8e5955a@%3Cuser.oozie.apache.org%3E'}, {'type':... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gf2j-7qwg-4f5x | 2022-09-14T22:26:11Z | 2018-12-21T17:48:45Z | null | ['CVE-2018-14637'] | Improper Authentication in Keycloak | The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14637'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gf2j-7qwg-4f5x'}] | {'cwe_ids': ['CWE-285', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gfv6-cj92-g3hx | 2023-08-08T12:26:56Z | 2018-12-21T17:46:39Z | null | ['CVE-2018-1000872'] | PyKMIP Denial of service vulnerability | OpenKMIP PyKMIP version All versions before 0.8.0 contains a CWE 399: Resource Management Errors (similar issue to CVE-2015-5262) vulnerability in PyKMIP server that can result in DOS: the server can be made unavailable by one or more clients opening all of the available sockets. This attack appear to be exploitable vi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pykmip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000872'}, {'type': 'WEB', 'url': 'https://github.com/OpenKMIP/PyKMIP/issues/430'}, {'type': 'WEB', 'url': 'https://github.com/OpenKMIP/PyKMIP/commit/3a7b880bdf70d295ed8af3a5880bab65fa6b3932'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenKMI... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8r8j-xvfj-36f9 | 2023-08-07T16:14:35Z | 2018-12-19T19:25:14Z | null | ['CVE-2018-20133'] | Code injection in ymlref | ymlref is a library that allows to load Yaml documents and resolve JSON-pointer references inside them. ymlref versions up to 0.1.1 allow code injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ymlref'}, 'ecosystem_specific': {'affected_functions': ['ymlref.api.load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20133'}, {'type': 'WEB', 'url': 'https://github.com/dexter2206/ymlref/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/dexter2206/ymlref'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3v44-382q-55f4 | 2021-08-31T21:30:36Z | 2018-12-21T17:50:13Z | null | ['CVE-2017-15713'] | Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main | Vulnerability in Apache Hadoop 0.23.x, 2.x before 2.7.5, 2.8.x before 2.8.3, and 3.0.0-alpha through 3.0.0-beta1 allows a cluster user to expose private files owned by the user running the MapReduce job history server process. The malicious user can construct a configuration file containing XML directives that referenc... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15713'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3v44-382q-55f4'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a790a251ace7213bde9f69777dedb453b1a01a6d18289c14a61d4f91@%3Cgeneral.hadoop.apache.org%3E'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mxr5-p36v-479m | 2022-09-14T22:11:51Z | 2018-12-19T19:24:03Z | null | ['CVE-2018-9207'] | Unrestricted Upload of File with Dangerous Type in jquery-file-upload | Arbitrary file upload in jQuery Upload File <= 4.0.2 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-file-upload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-9207'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mxr5-p36v-479m'}, {'type': 'WEB', 'url': 'http://www.vapidlabs.com/advisory.php?v=206'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rmm5-g63h-m6g9 | 2022-09-14T22:12:35Z | 2018-12-19T19:24:39Z | null | ['CVE-2018-20059'] | Improper Restriction of XML External Entity Reference in pippo-core | jaxb/JaxbEngine.java in Pippo 1.11.0 allows XXE. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'ro.pippo:pippo-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20059'}, {'type': 'WEB', 'url': 'https://github.com/pippo-java/pippo/issues/486'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rmm5-g63h-m6g9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pippo-java/pippo'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8p8g-f9vg-r7xr | 2022-09-14T22:25:15Z | 2018-12-21T17:48:19Z | null | ['CVE-2018-1000850'] | Directory Traversal vulnerability in Square Retrofit | Square Retrofit versions from (including) 2.0 to 2.5.0 (excluding) contain a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter. By manipulating the URL an attacker could add or delete resources otherwise unavailable to her. This attack appears to be exploitable via an encoded path param... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.squareup.retrofit2:retrofit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000850'}, {'type': 'WEB', 'url': 'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'ADVI... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j5rj-g695-342r | 2023-08-25T21:22:06Z | 2018-12-20T22:01:54Z | null | ['CVE-2018-1000842'] | Fat Free CRM vulnerable to Cross-site Scripting | FatFreeCRM version `<=0.14.1`, `>=0.15.0 <=0.15.1`, `>=0.16.0 <=0.16.3`, `>=0.17.0 <=0.17.2`, and `==0.18.0` contains a Cross Site Scripting (XSS) vulnerability in [commit 6d60bc8ed010c4eda05d6645c64849f415f68d65](https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa) that can res... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000842'}, {'type': 'WEB', 'url': 'https://github.com/asteinhauser/fat_free_crm/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa'}, {'type': 'PACKAGE', 'url': 'https://... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:09Z', 'nvd_published_at': '2018-12-20T15:29:00Z'} |
1.4.0 | GHSA-rqj9-cq6j-958r | 2022-09-14T22:27:02Z | 2018-12-21T17:50:26Z | null | ['CVE-2018-11766'] | Arbitrary Command Execution in Hadoop | In Apache Hadoop 2.7.4 to 2.7.6, the security fix for CVE-2016-6811 is incomplete. A user who can escalate to yarn user can possibly run arbitrary commands as root user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.4'}, {'fixed': '2.7.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11766'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rqj9-cq6j-958r'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E'}, {'ty... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j379-9jr9-w5cq | 2022-09-14T22:25:34Z | 2018-12-21T17:48:26Z | null | ['CVE-2018-1000844'] | XML External Entity (XXE) vulnerability in Square Retrofit | Square Open Source Retrofit versions prior to commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437 contain a XML External Entity (XXE) vulnerability in JAXB. An attacker could use this to remotely read files from the file system or to perform SSRF. This vulnerability appears to have been fixed in commit 4a693c5aeeef2be6c7ec... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.squareup.retrofit2:retrofit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000844'}, {'type': 'WEB', 'url': 'https://github.com/square/retrofit/pull/2735'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j379-9jr9-w5cq'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/retrofit'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q2qw-rmrh-vv42 | 2023-06-30T19:52:40Z | 2018-12-05T17:24:27Z | null | ['CVE-2018-16476'] | Improper Access Control in activejob | A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activejob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activejob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7.1'}]}], 'database_s... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16476'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/970b0d754be7c71a760d9b807eea32297fd838e3'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0600'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails... | {'cwe_ids': ['CWE-284', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-894g-6j7q-2hx6 | 2022-03-26T00:47:37Z | 2018-12-19T19:23:52Z | null | ['CVE-2018-16516'] | Cross site scripting in flask-admin | helpers.py in Flask-Admin 1.5.2 has Reflected XSS via a crafted URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'flask-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16516'}, {'type': 'WEB', 'url': 'https://github.com/flask-admin/flask-admin/pull/1699'}, {'type': 'WEB', 'url': 'https://github.com/flask-admin/flask-admin/commit/8af10e0b022464fdcb2da3d0ea5bbd2f11c0acd1'}, {'type': 'ADVISORY', 'url': 'https://gith... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fvm3-cfvj-gxqq | 2021-07-19T15:57:47Z | 2018-12-21T17:47:47Z | null | ['CVE-2016-3092'] | High severity vulnerability that affects commons-fileupload:commons-fileupload | The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-fileupload:commons-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3092'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0456'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1349468'}, {'type': 'A... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:21Z', 'nvd_published_at': '2016-07-04T22:59:00Z'} |
1.4.0 | GHSA-p69g-f978-xxv9 | 2022-09-14T22:14:38Z | 2018-12-20T22:01:39Z | null | ['CVE-2018-1000843'] | Cross-Site Request Forgery (CSRF) in Luigi | Luigi version prior to version 2.8.0; after commit 53b52e12745075a8acc016d33945d9d6a7a6aaeb; after GitHub PR spotify/luigi/pull/1870 contains a Cross ite Request Forgery (CSRF) vulnerability in API endpoint: /api/<method> that can result in Task metadata such as task name, id, parameter, etc. will be leaked to unauthor... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'luigi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000843'}, {'type': 'WEB', 'url': 'https://github.com/spotify/luigi/pull/1870'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p69g-f978-xxv9'}, {'type': 'PACKAGE', 'url': 'https://github.com/spotify/luigi'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8j39-fgfp-vxh8 | 2023-09-11T20:39:33Z | 2018-12-19T19:25:04Z | null | ['CVE-2018-20094'] | XXL-CONF Path Traversal vulnerability | An issue was discovered in XXL-CONF 1.6.0. There is a path traversal vulnerability via `../` in the keys parameter that can download any configuration file, related to `ConfController.java` and `PropUtil.java`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-conf-admin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20094'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-conf/issues/61'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-conf'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-conf/blob/6726dfe7979ea6d8fb983771471cde6978... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xx68-jfcg-xmmf | 2023-09-29T12:05:17Z | 2018-12-21T17:51:42Z | null | ['CVE-2014-0050'] | Commons FileUpload Denial of service vulnerability | MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-fileupload:commons-fileupload'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0050'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/29384723d8d9645b87e05be9fa369a4deeb78b9c'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1062337'}, {'type': 'ADVISORY', 'url': 'https://github.com/advis... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:56Z', 'nvd_published_at': '2014-04-01T06:27:00Z'} |
1.4.0 | GHSA-6x48-j4x4-cqw3 | 2022-09-14T22:27:39Z | 2018-12-21T17:50:29Z | null | ['CVE-2018-8009'] | Path Traversal in Hadoop | Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}], 'versions': ['3.1.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'int... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8009'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6x48-j4x4-cqw3'}, {'type': 'WEB', 'url': 'https://hadoop.apache.org/cve_list.html#cve-2018-8009-http-... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c289-47qf-rvrr | 2022-09-14T22:23:27Z | 2018-12-21T17:46:03Z | null | ['CVE-2018-1000855'] | Cross Site Scripting (XSS) vulnerability in easymon | easymon version 1.4 and earlier contains a Cross Site Scripting (XSS) vulnerability in Endpoint where monitoring is mounted that can result in Reflected XSS that affects Firefox. Can be used to steal cookies, depending on the cookie settings.. This attack appear to be exploitable via The victim must click on a crafted ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'easymon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000855'}, {'type': 'WEB', 'url': 'https://github.com/basecamp/easymon/issues/26'}, {'type': 'WEB', 'url': 'https://github.com/basecamp/easymon/pull/25'}, {'type': 'PACKAGE', 'url': 'https://github.com/basecamp/easymon'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-99qr-9cc9-fv2x | 2021-09-07T21:13:38Z | 2018-12-21T17:50:03Z | null | ['CVE-2017-3166'] | Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main | In Apache Hadoop versions 2.6.1 to 2.6.5, 2.7.0 to 2.7.3, and 3.0.0-alpha1, if a file in an encryption zone with access permissions that make it world readable is localized via YARN's localization mechanism, that file will be stored in a world-readable location and can be shared freely with any application that request... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3166'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-99qr-9cc9-fv2x'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2e16689b44bdd1976b6368c143a4017fc7159d1f2d02a5d54fe9310f@%3Cgeneral.hadoop.apache.org%3E'}, {'typ... | {'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3jq8-jg75-rqv6 | 2022-09-14T22:22:35Z | 2018-12-20T22:02:45Z | null | ['CVE-2018-17195'] | Cleartext Transmission of Sensitive Information in Apache nifi | The template upload API endpoint accepted requests from different domain when sent in conjunction with ARP spoofing + man in the middle (MiTM) attack, resulting in a CSRF attack. The required attack vector is complex, requiring a scenario with client certificate authentication, same subnet access, and injecting malicio... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17195'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3jq8-jg75-rqv6'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018-17195'}] | {'cwe_ids': ['CWE-319', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mq8p-h798-xcrp | 2022-09-14T22:26:37Z | 2018-12-21T17:50:20Z | null | ['CVE-2017-15718'] | Exposure of Sensitive Information in Hadoop | The YARN NodeManager in Apache Hadoop 2.7.3 and 2.7.4 can leak the password for credential store provider used by the NodeManager to YARN Applications. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.3'}, {'fixed': '2.7.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15718'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mq8p-h798-xcrp'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/773c93c2d8a6a52bbe97610c2b1c2ad205b970e1b8c04fb5b2fccad6@%3Cgeneral.hadoop.apache.org%3E'}] | {'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2xpp-75vr-22vq | 2022-09-14T22:21:45Z | 2018-12-20T22:02:24Z | null | ['CVE-2018-17192'] | Improper Restriction of Rendered UI Layers or Frames in Apache nifif | The X-Frame-Options headers were applied inconsistently on some HTTP responses, resulting in duplicate or missing security headers. Some browsers would interpret these results incorrectly, allowing clickjacking attacks. Mitigation: The fix to consistently apply the security headers was applied on the Apache NiFi 1.8.0 ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17192'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2xpp-75vr-22vq'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018-17192'}] | {'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:23Z', 'nvd_published_at': None} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.