schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringclasses
11 values
aliases
stringlengths
2
20
summary
stringlengths
4
172
details
stringlengths
47
3.95k
severity
stringlengths
2
79
affected
stringlengths
76
3.32k
references
stringlengths
82
11.3k
database_specific
stringlengths
131
190
1.4.0
GHSA-hvmf-r92r-27hr
2021-08-19T16:04:59Z
2019-12-04T21:26:28Z
null
['CVE-2019-19118']
Django allows unintended model editing
Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inlin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19118'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/103ebe2b5ff1b2614b85a52c239f471904d26244'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/36f580a17f0b3cb087deadf3b65eea024f479c21'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-04T19:44:26Z', 'nvd_published_at': None}
1.4.0
GHSA-v63x-xc9j-hhvq
2021-07-28T16:43:29Z
2019-12-11T02:01:44Z
null
['CVE-2019-10769']
Sandbox Breakout / Arbitrary Code Execution in safer-eval
All versions of `safer-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context and is not suited to process arbitrary user input. This may allow attackers to execute arbitrary code in the system. ## Recommendation The package is not meant to r...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'safer-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/commenthol/safer-eval/security/advisories/GHSA-v63x-xc9j-hhvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10769'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v63x-xc9j-hhvq'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK...
{'cwe_ids': ['CWE-20', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:57Z', 'nvd_published_at': '2019-12-06T23:15:00Z'}
1.4.0
GHSA-x92h-wmg2-6hp7
2021-08-19T15:18:27Z
2019-12-02T18:10:24Z
null
['CVE-2019-10913']
Invalid HTTP method overrides allow possible XSS or other attacks in Symfony
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, HTTP Methods provided as verbs or using the override header may be treated as trusted input, but they are not validated, possibly causing SQL injection or XSS. This is related to symfony/http-foundation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10913'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.ya...
{'cwe_ids': ['CWE-79', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:49:35Z', 'nvd_published_at': None}
1.4.0
GHSA-2mrj-435v-c2cr
2020-06-16T20:41:51Z
2019-12-02T18:15:31Z
2020-06-16T20:15:24Z
[]
possible DoS caused by malformed signature decoding in Pure-Python ECDSA
**Withdrawn:** Duplicate of GHSA-pwfw-mgfj-7g3g.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14853'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14853'}, {'type': 'WEB', 'url': 'https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:15:50Z', 'nvd_published_at': None}
1.4.0
GHSA-4328-8hgf-7wjr
2022-08-11T00:00:45Z
2019-12-13T15:39:32Z
null
['CVE-2019-16777']
npm Vulnerable to Global node_modules Binary Overwrite
Versions of the npm CLI prior to 6.13.4 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packag...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16777'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:057...
{'cwe_ids': ['CWE-22', 'CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:02Z', 'nvd_published_at': '2019-12-13T01:15:00Z'}
1.4.0
GHSA-4mvc-qc5w-v5qr
2023-09-20T19:22:55Z
2019-12-17T22:53:34Z
null
['CVE-2019-19712']
Information disclosure in the Contao backend
### Impact Backend users can manipulate the details view URL to show pages and articles that have not been enabled for them. ### Patches Update to Contao 4.4.46 or 4.8.6. ### Workarounds None. ### References https://contao.org/en/security-advisories/information-disclosure-in-the-back-end ### For more informatio...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.46'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_...
[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-4mvc-qc5w-v5qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19712'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T19:35:52Z', 'nvd_published_at': None}
1.4.0
GHSA-q58g-455p-8vw9
2021-10-29T14:10:27Z
2019-12-16T19:30:17Z
null
['CVE-2019-16779']
In RubyGem excon, interrupted Persistent Connections May Leak Response Data
### Impact There was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'excon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.71.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16779'}, {'type': 'WEB', 'url': 'https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29'}, {'type': 'PACKAGE', 'url': 'https:/...
{'cwe_ids': ['CWE-362', 'CWE-664'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-16T19:28:10Z', 'nvd_published_at': '2019-12-16T20:15:00Z'}
1.4.0
GHSA-m6cx-g6qm-p2cx
2021-10-21T21:16:09Z
2019-12-13T15:39:19Z
null
['CVE-2019-16775']
Arbitrary File Write in npm
Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to create files on a user's system when t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16775'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:057...
{'cwe_ids': ['CWE-59', 'CWE-61'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:50Z', 'nvd_published_at': '2019-12-13T01:15:00Z'}
1.4.0
GHSA-rh46-3fgc-mvrf
2021-08-19T16:05:30Z
2019-12-04T21:25:28Z
null
['CVE-2019-19507']
Validation bypass is possible in Json Pattern Validator
In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the ty...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jpv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19507'}, {'type': 'WEB', 'url': 'https://github.com/manvel-khnkoyan/jpv/issues/6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jpv'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-04T19:47:26Z', 'nvd_published_at': None}
1.4.0
GHSA-qhrx-hcm6-pmrw
2023-01-17T13:55:02Z
2019-12-02T18:12:26Z
null
['CVE-2019-11458']
Unsafe deserialization in SmtpTransport in CakePHP
An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.15'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11458'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html'}, {'type': 'WEB', 'url': 'http...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T00:51:02Z', 'nvd_published_at': None}
1.4.0
GHSA-484f-743f-6jx2
2022-07-05T18:07:34Z
2019-12-12T22:50:20Z
null
['CVE-2019-16774']
Object injection in cookie driver in phpfastcache
### Impact An possible object injection has been discovered in cookie driver prior 5.0.13 versions (of 5.x releases). ### Patches The issue has been addressed by enforcing JSON conversion when deserializing ### Workarounds If you can't fix it, use another driver such as "Files" (Filesystem) ### References Fixing rel...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpfastcache/phpfastcache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-484f-743f-6jx2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16774'}, {'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/commit/c4527205cb7a402b595790c74310791f5b04a1a4'},...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:47Z', 'nvd_published_at': None}
1.4.0
GHSA-6xc2-mj39-q599
2022-08-02T15:09:07Z
2019-12-02T18:20:41Z
null
['CVE-2019-18818']
Strapi allows unauthenticated attacker to reset admin password without valid reset token
Versions of `strapi` prior to 3.0.0-beta.17.5 are vulnerable to Privilege Escalation. The password reset routes allows an unauthenticated attacker to reset an admin's password without providing a valid password reset token. ## Recommendation Upgrade to version 3.0.0-beta.17.5 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-beta.17.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.17.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18818'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/4443'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18818'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-640'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:36:24Z', 'nvd_published_at': '2019-11-07T22:15:00Z'}
1.4.0
GHSA-x8qc-rrcw-4r46
2022-08-10T23:58:46Z
2019-12-13T15:39:26Z
null
['CVE-2019-16776']
npm symlink reference outside of node_modules
Versions of the npm CLI prior to 6.13.3 are vulnerable to a symlink reference outside of node_modules. It is possible for packages to create symlinks to files outside of the`node_modules` folder through the `bin` field upon installation. A properly constructed entry in the package.json bin field would allow a package p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16776'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:057...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:49Z', 'nvd_published_at': '2019-12-13T01:15:00Z'}
1.4.0
GHSA-79gr-58r3-pwm3
2023-09-21T19:46:51Z
2019-12-02T18:07:16Z
null
['CVE-2019-18889']
Symfony Unsafe Cache Serialization Could Enable RCE
An issue was discovered in Symfony 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. Serializing certain cache adapter interfaces could result in remote code injection. This is related to symfony/cache.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.4.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ecosystem_specific': {'affected_functions'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18889'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-18889.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-1...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:45:07Z', 'nvd_published_at': None}
1.4.0
GHSA-844w-j86r-4x2j
2021-11-01T14:12:42Z
2019-12-16T20:17:10Z
null
['CVE-2019-16778']
Heap buffer overflow in `UnsortedSegmentSum` in TensorFlow
### Impact A heap buffer overflow in `UnsortedSegmentSum` can be produced when the `Index` template argument is `int32`. In this case `data_size` and `num_segments` fields are truncated from `int64` to `int32` and can produce negative numbers, resulting in accessing out of bounds heap memory. This is unlikely to be e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}, {'package': {'ecosystem':...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-844w-j86r-4x2j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16778'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-122', 'CWE-681'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-12-16T20:16:12Z', 'nvd_published_at': '2019-12-16T21:15:00Z'}
1.4.0
GHSA-hrqr-hxpp-chr3
2021-11-03T14:59:03Z
2019-12-18T19:01:31Z
null
['CVE-2019-16782']
Possible Information Leak / Session Hijack Vulnerability in Rack
There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16782'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-18T19:01:07Z', 'nvd_published_at': '2019-12-18T20:15:00Z'}
1.4.0
GHSA-m5ff-3wj3-8ph4
2019-12-26T16:34:06Z
2019-12-26T16:34:38Z
null
[]
HTTP Request Smuggling: Invalid whitespace characters in headers in Waitress
### Impact If a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. ``` Content-Length: 10 Transfer-Encoding: [\x0b]chunked ``` For clarity: ``` 0x0b == vertical ...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.parse_header']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017'}]
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T16:34:06Z', 'nvd_published_at': None}
1.4.0
GHSA-fpff-384j-vxq7
2021-08-19T15:10:08Z
2019-12-02T18:05:13Z
null
['CVE-2019-10763']
Data leakage via SQL Injection in Pimcore
pimcore/pimcore before 6.3.0 is vulnerable to SQL Injection. An attacker with limited privileges (classes permission) can achieve a SQL injection that can lead in data leakage. The vulnerability can be exploited via 'id', 'storeId', 'pageSize' and 'tables' parameters, using a payload for trigger a time based or error b...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10763'}, {'type': 'WEB', 'url': 'https://blog.certimetergroup.com/it/articolo/security/sql_injection_in_pimcore_6.2.3'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-480391'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:55:07Z', 'nvd_published_at': None}
1.4.0
GHSA-6rmq-x2hv-vxpp
2023-09-08T14:19:06Z
2019-12-02T18:11:25Z
null
['CVE-2019-6338']
Drupal core third-party PEAR Archive_Tar library is vulnerable to Deserialization of Untrusted Data
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; Drupal core uses the third-party PEAR Archive_Tar library. This library has released a security update which impacts some Drupal configurations. Refer to CVE-2018-1000888 for details
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.62.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6338'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6338.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/02/msg00032.html'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T00:34:49Z', 'nvd_published_at': None}
1.4.0
GHSA-4vpc-5jx4-cfqg
2021-07-28T15:49:16Z
2019-12-02T18:09:21Z
null
['CVE-2019-18886']
User enumeration leak using switch user functionality in Symfony
An issue was discovered in Symfony 4.2.0 to 4.2.11 and 4.3.0 to 4.3.7. The ability to enumerate users was possible due to different handling depending on whether the user existed when making unauthorized attempts to use the switch users functionality. This is related to symfony/security.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18886'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-18886.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CV...
{'cwe_ids': ['CWE-200', 'CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:47:26Z', 'nvd_published_at': '2019-11-21T18:15:00Z'}
1.4.0
GHSA-g2xc-35jw-c63p
2022-04-25T23:07:24Z
2019-12-20T23:04:18Z
null
['CVE-2019-16786']
HTTP Request Smuggling: Invalid Transfer-Encoding in Waitress
### Impact Waitress would parse the `Transfer-Encoding` header and only look for a single string value, if that value was not `chunked` it would fall through and use the `Content-Length` header instead. According to the HTTP standard `Transfer-Encoding` should be a comma separated list, with the inner-most encoding f...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.received', 'waitress.parser.HTTPRequestParser.parse_header', 'waitress.parser.get_header_lines', 'waitress.receiver.ChunkedReceiver', 'waitress.receiver.ChunkedReceiver.received', 'wa...
[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16786'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-20T23:01:53Z', 'nvd_published_at': '2019-12-20T23:15:00Z'}
1.4.0
GHSA-h9rv-jmmf-4pgx
2021-01-08T18:42:22Z
2019-12-05T18:44:37Z
null
['CVE-2019-16769']
Cross-Site Scripting in serialize-javascript
Versions of `serialize-javascript` prior to 2.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications. ## Recommendation Upgrade to version 2.1.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'serialize-javascript'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-h9rv-jmmf-4pgx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16769'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h9rv-jmmf-4pgx'}, {'type': 'WEB', 'url': 'https://www.npmjs.co...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:51Z', 'nvd_published_at': None}
1.4.0
GHSA-6rjc-4pwr-3vp7
2021-08-19T15:34:42Z
2019-12-02T18:14:30Z
null
['CVE-2019-10771']
Cross-Site Scripting in iobroker.web
Versions of `iobroker.web` prior to 2.4.10 are vulnerable to Cross-Site Scripting. The package fails to escape URL parameters that may be reflected in the server response. This can be used by attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 2.4.10 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'iobroker.web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10771'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IOBROKERWEB-534971'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1345'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:13:05Z', 'nvd_published_at': None}
1.4.0
GHSA-9xcj-c8cr-8c3c
2022-10-07T20:34:53Z
2019-12-26T18:22:26Z
null
['CVE-2019-17563']
In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack
When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.99'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intro...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17563'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T18:22:01Z', 'nvd_published_at': '2019-12-23T17:15:00Z'}
1.4.0
GHSA-4ppp-gpcr-7qf6
2022-03-24T17:52:19Z
2019-12-20T23:04:35Z
null
[]
HTTP Request Smuggling: Content-Length Sent Twice in Waitress
### Impact Waitress would header fold a double `Content-Length` header and due to being unable to cast the now comma separated value to an integer would set the `Content-Length` to 0 internally. So a request with: ``` Content-Length: 10 Content-Length: 10 ``` would get transformed to: ``` Content-Length: 10, 10 ``...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.parse_header']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'}, {'type': 'WEB', 'url': 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'}, {'typ...
{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-20T23:02:03Z', 'nvd_published_at': None}
1.4.0
GHSA-cmch-296j-wfvw
2021-08-19T15:11:15Z
2019-12-02T18:06:14Z
null
['CVE-2019-10767']
Arbitrary File Write in iobroker.js-controller
Versions of `iobroker.controller` prior to 2.0.25 are vulnerable to Path Traversal. The package fails to restrict access to folders outside of the intended `/adapter/<adapter-name>` folder, which may allow attackers to include arbitrary files in the system. An attacker would need to be authenticated to perform the atta...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'iobroker.js-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.25'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10767'}, {'type': 'WEB', 'url': 'https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T03:26:55Z', 'nvd_published_at': None}
1.4.0
GHSA-26p8-xrj2-mv53
2021-08-19T16:02:34Z
2019-12-02T18:18:37Z
null
['CVE-2019-10083']
Apache NiFi process group information disclosure
When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10083'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2019-10083'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:30:21Z', 'nvd_published_at': None}
1.4.0
GHSA-h47j-hc6x-h3qq
2023-09-12T18:35:46Z
2019-12-30T19:30:31Z
null
['CVE-2019-10758']
Remote Code Execution Vulnerability in NPM mongo-express
### Impact Remote code execution on the host machine by any authenticated user. ### Proof Of Concept Launching mongo-express on a Mac, pasting the following into the "create index" field will pop open the Mac calculator: ```javascript this.constructor.constructor("return process")().mainModule.require('child_proces...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mongo-express'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.54.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10758'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/pull/522'}, {'type': 'WEB', 'url': 'https://github.com...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-30T19:29:02Z', 'nvd_published_at': None}
1.4.0
GHSA-7xxv-wpxj-mx5v
2023-09-05T14:45:56Z
2019-12-02T18:03:09Z
null
['CVE-2019-19275']
typed-ast Out-of-bounds Read
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'typed-ast'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19275'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:25:57Z', 'nvd_published_at': None}
1.4.0
GHSA-4x6v-rwh4-55jw
2023-09-08T19:57:36Z
2019-12-02T18:16:34Z
null
['CVE-2019-18954']
Pomelo allows external control of critical state data
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in `template/game-server/app/servers/connector/handler/entryHandler.js` because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipul...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'pomelo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18954'}, {'type': 'WEB', 'url': 'https://github.com/NetEase/pomelo/issues/1149'}, {'type': 'WEB', 'url': 'https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation'}]
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:20:21Z', 'nvd_published_at': None}
1.4.0
GHSA-hh3j-x4mc-g48r
2022-04-19T18:42:25Z
2019-12-26T18:22:36Z
null
['CVE-2019-12418']
Insufficiently Protected Credentials in Apache Tomcat
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords use...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.99'}]}], 'database_specific': {'last_known_affected_version_range': '< 7.0.98'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12418'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5...
{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T18:22:10Z', 'nvd_published_at': '2019-12-23T18:15:00Z'}
1.4.0
GHSA-35fr-h7jr-hh86
2021-04-27T18:03:07Z
2019-12-06T18:55:47Z
null
[]
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') in Armeria
Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. ### Impact 1. Cross-User Defacement 2. Cache Poisoning 3. Cros...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.linecorp.armeria:armeria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.85.0'}, {'fixed': '0.97.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86'}]
{'cwe_ids': ['CWE-113', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T18:03:07Z', 'nvd_published_at': None}
1.4.0
GHSA-5h9j-q6j2-253f
2021-06-15T17:23:03Z
2019-12-02T18:13:28Z
null
['CVE-2019-17632']
Unescaped exception messages in error responses in Jetty
In Eclipse Jetty versions 9.4.21.v20190926, 9.4.22.v20191022, and 9.4.23.v20191118, the generation of default unhandled Error response content (in text/html and text/json Content-Type) does not escape Exception messages in stacktraces included in error output.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.21.v20190926'}, {'fixed': '9.4.24.v20191120'}]}], 'versions': ['9.4.21.v20190926']}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17632'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=553443'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAITZ27GKPD2CCNHGT2VBT4VWIBUJJNS/'}, {'t...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:09:14Z', 'nvd_published_at': '2019-11-25T22:15:00Z'}
1.4.0
GHSA-hm6q-r2jc-cpqh
2023-09-06T20:10:25Z
2019-12-16T19:29:33Z
null
['CVE-2019-19771']
lodahs is malware
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a d...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'lodahs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19771'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1417'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/lodahs'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-15T14:26:04Z', 'nvd_published_at': '2019-12-12T20:15:00Z'}
1.4.0
GHSA-m3jw-62m7-jjcm
2023-09-05T14:46:42Z
2019-12-02T18:02:02Z
null
['CVE-2019-19274']
typed-ast Out-of-bounds Read
typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'typed-ast'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19274'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:13:07Z', 'nvd_published_at': None}
1.4.0
GHSA-744r-vv2g-2x6g
2021-06-15T17:22:36Z
2019-12-02T18:17:36Z
null
['CVE-2019-10080']
Apache NiFi information disclosure by XXE
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10080'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3507'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:27:21Z', 'nvd_published_at': '2019-11-19T22:15:00Z'}
1.4.0
GHSA-fmqw-vqh5-cwq9
2021-08-19T16:03:16Z
2019-12-02T18:19:39Z
null
['CVE-2019-12421']
Apache NiFi user log out issue
When using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-security'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-api'}, 'ecosystem_speci...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12421'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3362'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/cf6f5172503ce438c6c22c334c9367f774db7b24'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca3...
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:32:47Z', 'nvd_published_at': None}
1.4.0
GHSA-7xx3-m584-x994
2021-01-08T19:12:47Z
2019-12-05T19:26:37Z
null
['CVE-2019-16770']
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack
## Keepalive thread overload/DoS ### Impact A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends re...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16770'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7xx3-m584-x994'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advis...
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:51Z', 'nvd_published_at': '2019-12-05T20:15:00Z'}
1.4.0
GHSA-jc43-qrrp-98f5
2023-04-25T16:31:36Z
2019-12-17T22:53:40Z
null
['CVE-2019-19714']
Insert tag injection in the Contao login module
### Impact It is possible to inject insert tags into the login module which will be replaced when the page is rendered. ### Patches Update to Contao 4.8.6. ### Workarounds None. ### References https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module ### For more information If you hav...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.4'}, {'fixed': '4.8.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-jc43-qrrp-98f5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19714'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T19:35:29Z', 'nvd_published_at': None}
1.4.0
GHSA-42fp-4hm3-j8r7
2021-08-31T21:37:18Z
2019-01-04T17:46:08Z
null
['CVE-2017-5934']
Moderate severity vulnerability that affects moin
Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'moin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5934'}, {'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-42fp-4hm3-j8r7'}, {'type': 'PACKAGE', 'url': 'https://github.com...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:59Z', 'nvd_published_at': None}
1.4.0
GHSA-45r8-3495-x6rm
2022-09-17T00:06:13Z
2019-01-04T17:43:36Z
null
['CVE-2018-18893']
Jinjava calls getClass
Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.hubspot.jinjava:jinjava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18893'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/pull/230'}, {'type': 'PACKAGE', 'url': 'https://github.com/HubSpot/jinjava'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/blob/master/CHANGES.md'}, {'type': 'ADVISOR...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:27Z', 'nvd_published_at': None}
1.4.0
GHSA-4rm3-4mq4-mfwr
2022-09-14T22:29:42Z
2019-01-04T17:43:22Z
null
['CVE-2018-20595']
Cross-Site Request Forgery (CSRF) in hswebframework.web:hsweb-commons
A CSRF issue was discovered in web/authorization/oauth2/controller/OAuth2ClientController.java in hsweb 3.0.4 because the state parameter in the request is not compared with the state parameter in the session after user authentication is successful.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.hswebframework.web:hsweb-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20595'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/issues/107'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2'}, {'type': 'ADVISORY', 'url': 'https://githu...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:04Z', 'nvd_published_at': None}
1.4.0
GHSA-wr5r-m8pc-85j9
2020-06-16T22:01:07Z
2019-01-25T16:18:49Z
null
['CVE-2019-3772']
Low severity vulnerability that affects org.springframework.integration:spring-integration-ws and org.springframework.integration:spring-integration-xml
Spring Integration (spring-integration-xml and spring-integration-ws modules), versions 4.3.18, 5.0.10, 5.1.1, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-xml'}, 'ranges': [{'type': 'ECOS...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3772'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wr5r-m8pc-85j9'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3772'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5...
{'cwe_ids': ['CWE-611'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:07Z', 'nvd_published_at': None}
1.4.0
GHSA-m9mq-p2f9-cfqv
2023-08-08T10:24:53Z
2019-01-04T17:46:30Z
null
['CVE-2018-7753']
Bleach URI Scheme Restriction Bypass
An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'bleach'}, 'ecosystem_specific': {'affected_functions': ['bleach.sanitizer.BleachSanitizerFilter.allow_token']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7753'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/892252'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m9mq-p2f9...
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:43Z', 'nvd_published_at': None}
1.4.0
GHSA-2x54-j4m3-r6wx
2023-08-07T15:57:08Z
2019-01-04T17:44:48Z
null
['CVE-2019-3575']
sqla-yaml-fixtures is vulnerable to Code Injection
Sqla_yaml_fixtures versions up to 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in `sqla_yaml_fixtures.load`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sqla-yaml-fixtures'}, 'ecosystem_specific': {'affected_functions': ['sqla_yaml_fixtures.load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3575'}, {'type': 'WEB', 'url': 'https://github.com/schettino72/sqla_yaml_fixtures/issues/20'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2x54-j4m3-r6wx'}, {'type': 'PACKAGE', 'url': 'https://github.com/schettino72/sqla_yaml_fi...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:16Z', 'nvd_published_at': None}
1.4.0
GHSA-6qvp-r6r3-9p7h
2023-08-26T00:01:34Z
2019-01-17T14:05:03Z
null
['CVE-2018-14404']
Nokogiri NULL Pointer Dereference
A NULL pointer dereference vulnerability exists in the `xpath.c:xmlXPathCompOpEval()` function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the `XPATH_OP_AND` or `XPATH_OP_OR` case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a den...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14404'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1785'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1543'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817'},...
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:04Z', 'nvd_published_at': None}
1.4.0
GHSA-4p24-vmcr-4gqj
2023-08-25T23:47:33Z
2019-01-17T13:57:27Z
null
['CVE-2016-10735']
Bootstrap XSS vulnerability
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute. Note that this is a different vulnerability than CVE-2018-14041. See https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ for more info.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10735'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/20184'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/23679...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:39Z', 'nvd_published_at': '2019-01-09T05:29:00Z'}
1.4.0
GHSA-8222-6fc8-mhvf
2021-06-15T16:59:20Z
2019-01-25T16:18:52Z
null
['CVE-2019-3773']
Vulnerability that affects org.springframework.ws:spring-ws and org.springframework.ws:spring-xml
Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3773'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8222-6fc8-mhvf'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3773'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type'...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:54Z', 'nvd_published_at': '2019-01-18T22:29:00Z'}
1.4.0
GHSA-r28v-mw67-m5p9
2023-09-05T12:37:34Z
2019-01-04T17:50:07Z
null
['CVE-2018-7536']
Django Denial-of-service possibility in urlize and urlizetrunc template filters
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The `django.utils.html.urlize()` function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The `urlize(...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7536'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-185'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:19Z', 'nvd_published_at': '2018-03-09T20:29:00Z'}
1.4.0
GHSA-mc23-976p-j42x
2022-12-18T23:44:26Z
2019-01-14T16:19:55Z
null
['CVE-2019-0542']
xterm vulnerable to remote code execution
A remote code execution vulnerability exists in Xterm.js when the component mishandles special characters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'xterm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'xterm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.2'}]}]}, {'package': {'ecosystem': 'npm', 'n...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0542'}, {'type': 'WEB', 'url': 'https://github.com/xtermjs/xterm.js/commit/3592c641cd0348e0b698e8a180aea2072c6bcd9a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/erra...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:48Z', 'nvd_published_at': '2019-01-09T15:29:00Z'}
1.4.0
GHSA-f9hv-mg5h-xcw9
2023-06-12T22:34:10Z
2019-01-04T19:06:57Z
null
['CVE-2018-19360']
Deserialization of Untrusted Data in jackson-databind due to polymorphic deserialization
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19360'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://a...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:16Z', 'nvd_published_at': None}
1.4.0
GHSA-4q69-q4q7-x82c
2023-09-06T20:01:34Z
2019-01-04T17:41:46Z
null
['CVE-2017-18353']
rendertron can remotely shut down Chrome instance
Rendertron 1.0.0 includes an `_ah/stop` route to shutdown the Chrome instance responsible for serving render requests to all users. Visiting this route with a GET request allows any unauthorized remote attacker to disable the core service of the application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18353'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromi...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:46Z', 'nvd_published_at': None}
1.4.0
GHSA-77rc-x84q-pv4f
2022-09-14T22:41:33Z
2019-01-25T16:19:19Z
null
['CVE-2018-20245']
Improper Certificate Validation in Apache Airflow
The LDAP auth backend (airflow.contrib.auth.backends.ldap_auth) prior to Apache Airflow 1.10.1 was misconfigured and contained improper checking of exceptions which disabled server certificate checking.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20245'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-77rc-x84q-pv4f'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b549c7573b342a6e457e5a3225c33054244343927bbfb2a4cdc4cf73@%3Cdev.airflow.apache.org%3E'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:58Z', 'nvd_published_at': None}
1.4.0
GHSA-3wc8-659g-r88q
2020-06-16T20:56:44Z
2019-01-25T16:18:56Z
null
['CVE-2019-3774']
Low severity vulnerability that affects org.springframework.batch:spring-batch-core
Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.batch:spring-batch-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.batch:spring-batch-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'i...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3774'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3wc8-659g-r88q'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01292194daa9ed3117b34dabec0c26929f6db13b9613fc144f720d52@%3Cissues.servicemix.apache.org%3E'}, {...
{'cwe_ids': ['CWE-611'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:44Z', 'nvd_published_at': None}
1.4.0
GHSA-9gqg-3fxr-9hv7
2023-08-30T23:28:15Z
2019-01-25T16:19:09Z
null
['CVE-2017-17836']
Apache Airflow vulnerable to XSS
In Apache Airflow 1.8.2 and earlier, an experimental Airflow feature displayed authenticated cookies, as well as passwords to databases used by Airflow. An attacker who has limited access to airflow, weather it be via XSS or by leaving a machine unlocked can exfil all credentials from the system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17836'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9gqg-3fxr-9hv7'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:37Z', 'nvd_published_at': None}
1.4.0
GHSA-38rv-5jqc-m2cv
2023-09-01T20:25:56Z
2019-01-04T17:48:09Z
null
['CVE-2017-0906']
Recurly vulnerable to SSRF
The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.2 is vulnerable to a Server-Side Request Forgery vulnerability in the `Resource.get` method that could result in compromise of API keys or other critical resources.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0906'}, {'type': 'WEB', 'url': 'https://github.com/recurly/recurly-client-python/commit/049c74699ce93cf126feff06d632ea63fba36742'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288635'}, {'type': 'ADVISORY', 'url': 'https://github.com/advi...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:38Z', 'nvd_published_at': None}
1.4.0
GHSA-3mgp-fx93-9xv5
2023-01-23T20:33:58Z
2019-01-17T13:57:34Z
null
['CVE-2018-20676']
XSS vulnerability that affects bootstrap
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20676'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27044'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/279...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:33Z', 'nvd_published_at': '2019-01-09T05:29:00Z'}
1.4.0
GHSA-7qqv-r2q4-jxhm
2021-09-03T21:43:07Z
2019-01-14T16:19:31Z
null
['CVE-2018-1000809']
High severity vulnerability that affects privacyIDEA
privacyIDEA version 2.23.1 and earlier contains a Improper Input Validation vulnerability in token validation api that can result in Denial-of-Service. This attack appear to be exploitable via http request with user=<space>&pass= to /validate/check url. This vulnerability appears to have been fixed in 2.23.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'privacyIDEA'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.23.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000809'}, {'type': 'WEB', 'url': 'https://github.com/privacyidea/privacyidea/issues/1227'}, {'type': 'WEB', 'url': 'https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751'}, {'type': 'ADVISORY', 'url': 'https://...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:21Z', 'nvd_published_at': None}
1.4.0
GHSA-68wv-rjrm-576p
2022-09-14T22:40:56Z
2019-01-25T16:19:14Z
null
['CVE-2017-17835']
Cross-Site Request Forgery (CSRF) in Apache Airflow
In Apache Airflow 1.8.2 and earlier, a CSRF vulnerability allowed for a remote command injection on a default install of Airflow.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17835'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-68wv-rjrm-576p'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:39Z', 'nvd_published_at': None}
1.4.0
GHSA-ph58-4vrj-w6hr
2023-01-23T21:29:22Z
2019-01-17T13:57:56Z
null
['CVE-2018-20677']
bootstrap Cross-site Scripting vulnerability
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20677'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27045'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/279...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:11Z', 'nvd_published_at': '2019-01-09T05:29:00Z'}
1.4.0
GHSA-mx9v-gmh4-mgqw
2022-09-14T22:31:36Z
2019-01-04T19:07:01Z
null
['CVE-2018-19361']
Deserialization of Untrusted Data in jackson-databind
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.j...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19361'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://a...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:38Z', 'nvd_published_at': None}
1.4.0
GHSA-j87c-cj65-vmh5
2023-09-06T20:06:31Z
2019-01-04T17:41:51Z
null
['CVE-2017-18354']
rendertron LFI vulnerability
Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18354'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromi...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:38Z', 'nvd_published_at': None}
1.4.0
GHSA-xvwv-6wvx-px9x
2023-09-01T21:13:18Z
2019-01-04T17:47:21Z
null
['CVE-2017-1000484']
Plone Open Redirect
By linking to a specific url in Plone 2.5-5.1rc1 with a parameter, an attacker could send you to his own website. On its own this is not so bad: the attacker could more easily link directly to his own website instead. But in combination with another attack, you could be sent to the Plone login form and login, then get ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000484'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/2232'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xvwv-6wvx-px9x'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'W...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:39Z', 'nvd_published_at': None}
1.4.0
GHSA-mvjj-gqq2-p4hw
2023-09-13T19:45:25Z
2019-01-04T19:05:35Z
null
['CVE-2018-6341']
Cross-Site Scripting in react-dom
Affected versions of `react-dom` are vulnerable to Cross-Site Scripting (XSS). The package fails to validate attribute names in HTML tags which may lead to Cross-Site Scripting in specific scenarios. This may allow attackers to execute arbitrary JavaScript in the victim's browser. To be affected by this vulnerability, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.0.1'}]}], 'versions': ['16.0.0']}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_funct...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6341'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mvjj-gqq2-p4hw'}, {'type': 'WEB', 'url': 'https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:react-dom:20180802'}, {'ty...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:15Z', 'nvd_published_at': None}
1.4.0
GHSA-chj8-5xgw-wcvj
2021-09-09T18:04:45Z
2019-01-07T19:14:46Z
null
['CVE-2016-8750']
Moderate severity vulnerability that affects org.apache.karaf:apache-karaf
Apache Karaf prior to 4.0.8 used the LDAPLoginModule to authenticate users to a directory via LDAP. However, it did not encoding usernames properly and hence was vulnerable to LDAP injection attacks leading to a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8750'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1322'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-chj8-5xgw-wcvj'}, {'type': 'WEB', 'url': 'https://karaf.apache.org/security/cve-2016-8750.txt'}, {'ty...
{'cwe_ids': ['CWE-90'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:46Z', 'nvd_published_at': None}
1.4.0
GHSA-98gj-wwxm-cj3h
2023-08-07T16:27:52Z
2019-01-04T17:47:50Z
null
['CVE-2017-16876']
mistune Cross-site scripting (XSS) vulnerability
Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the "key" argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mistune'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16876'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1524596'}, {'type': 'ADVISORY', 'url': 'https://github.com/ad...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:52Z', 'nvd_published_at': None}
1.4.0
GHSA-vx85-mj8c-4qm6
2023-09-11T18:30:27Z
2019-01-17T13:56:33Z
null
['CVE-2018-11798']
Apache Thrift Node.js static web server sandbox escape
The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.2'}, {'fixed': '0.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11798'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/pull/1606'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/commit/2a2b72f6c8aef200ecee4984f011e06052288ff2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA...
{'cwe_ids': ['CWE-538'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:46Z', 'nvd_published_at': None}
1.4.0
GHSA-37hp-765x-j95x
2023-09-05T14:07:04Z
2019-01-04T17:50:26Z
null
['CVE-2017-7233']
Django Open redirect and possible XSS attack via user-supplied numeric redirect URLs
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnera...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10'}, {'fixed': '1.10.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'typ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7233'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1445'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1451'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1462'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:21Z', 'nvd_published_at': None}
1.4.0
GHSA-c8hm-7hpq-7jhg
2021-06-10T23:51:07Z
2019-01-04T19:07:03Z
null
['CVE-2018-19362']
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19362'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://a...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:35Z', 'nvd_published_at': None}
1.4.0
GHSA-4gq5-ch57-c2mg
2023-09-13T18:31:09Z
2019-01-04T19:09:49Z
null
['CVE-2018-14719']
Arbitrary Code Execution in jackson-databind
FasterXML jackson-databind 2.x before 2.9.7, 2.8.11.3, and 2.7.9.5 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-data...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14719'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://a...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:21Z', 'nvd_published_at': '2019-01-02T18:29:00Z'}
1.4.0
GHSA-cq9c-55r7-455x
2022-09-14T22:34:31Z
2019-01-07T19:14:51Z
null
['CVE-2018-11787']
Improper Authentication in Apache Karaf
In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11787'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cq9c-55r7-455x'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/KARAF-4993'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d9ba4c3104ba32225646...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:22Z', 'nvd_published_at': None}
1.4.0
GHSA-29gp-92wp-94q8
2022-08-03T19:36:45Z
2019-01-04T17:41:20Z
null
['CVE-2018-6342']
react-dev-utils on Windows vulnerable to Remote Code Execution
`react-dev-utils` on Windows is vulnerable to remote code execution. ## Recommendation Update to one of the following versions, depending on the release line that you are using. - 1.0.4 - 2.0.2 - 3.1.2 - 4.2.2 - 5.0.2 - 6.0.0-next.a671462c
[]
[{'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6342'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/pull/4866'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-29gp-92wp-94q8'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/create-react-app'}, ...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:46Z', 'nvd_published_at': '2018-12-31T22:29:00Z'}
1.4.0
GHSA-2f9x-5v75-3qv4
2023-09-05T14:06:09Z
2019-01-04T17:50:00Z
null
['CVE-2018-7537']
Django Denial-of-service possibility in truncatechars_html and truncatewords_html template filters
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. T...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7537'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0265'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2f9x-5v75-3qv4'}, {'type':...
{'cwe_ids': ['CWE-185'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:51Z', 'nvd_published_at': None}
1.4.0
GHSA-h4hv-m4h4-mhwg
2023-09-05T18:19:49Z
2019-01-04T17:50:17Z
null
['CVE-2017-7234']
Django open redirect
A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the `django.views.static.serve()` view could redirect to any other domain, aka an open redirect vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10'}, {'fixed': '1.10.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'typ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7234'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h4hv-m4h4-mhwg'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170429023907/http://www.securitytracker....
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:44Z', 'nvd_published_at': None}
1.4.0
GHSA-j88m-953w-8r2c
2023-09-06T20:07:11Z
2019-01-07T19:14:21Z
null
['CVE-2017-18352']
rendertron XSS vulnerability
Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18352'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromi...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:41Z', 'nvd_published_at': None}
1.4.0
GHSA-q485-j897-qc27
2022-09-14T22:34:12Z
2019-01-07T19:14:34Z
null
['CVE-2018-20433']
XML External Entity Reference in mchange:c3p0
c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.mchange:c3p0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.5.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20433'}, {'type': 'WEB', 'url': 'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q485-j897-qc27'}, {'type': 'PACKAGE', 'url': 'https://github.com/zh...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:54Z', 'nvd_published_at': None}
1.4.0
GHSA-92wj-x78c-m4fx
2023-09-11T22:40:24Z
2019-01-07T19:14:49Z
null
['CVE-2018-11788']
XML External Entity Reference in Apache Karaf
Apache Karaf provides a features deployer, which allows users to "hot deploy" a features XML by dropping the file directly in the deploy folder. The features XML is parsed by XMLInputFactory class. Apache Karaf XMLInputFactory class doesn't contain any mitigation codes against XXE. This is a potential security risk as ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.specs:org.apache.karaf.specs.java.xml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.specs:org.a...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11788'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/commit/0c36c50bc158739c8fc8543122a6740c54adafca'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/karaf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227101219/ht...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:16Z', 'nvd_published_at': None}
1.4.0
GHSA-9r8w-6x8c-6jr9
2023-09-05T17:57:28Z
2019-01-04T17:50:34Z
null
['CVE-2017-12794']
Django vulnerable to XSS on 500 pages
In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with `DEBUG ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12794'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9r8w-6x8c-6jr9'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3559-1/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170927072701/http://www.securitytracker.com/i...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:31Z', 'nvd_published_at': None}
1.4.0
GHSA-jhjh-ghwx-6h7r
2023-09-01T09:30:29Z
2019-01-17T13:56:18Z
null
['CVE-2017-1002157']
modulemd uses an unsafe function for processing externally provided data
modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'modulemd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002157'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhjh-ghwx-6h7r'}, {'type': 'PACKAGE', 'url': 'https://github.com/xsuchy/modulemd'}, {'type': 'WEB', 'url': 'https://pagure.io/modulemd/issue/55'}]
{'cwe_ids': ['CWE-20', 'CWE-242'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:31Z', 'nvd_published_at': '2019-01-10T21:29:00Z'}
1.4.0
GHSA-x2w5-5m2g-7h5m
2023-06-12T22:34:49Z
2019-01-04T19:09:46Z
null
['CVE-2018-14720']
XML External Entity Reference (XXE) in jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14720'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://a...
{'cwe_ids': ['CWE-502', 'CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:50Z', 'nvd_published_at': None}
1.4.0
GHSA-rprw-h62v-c2w7
2023-09-05T17:58:47Z
2019-01-04T17:45:26Z
null
['CVE-2017-18342']
PyYAML insecurely deserializes YAML strings leading to arbitrary code execution
In PyYAML before 4.1, the `yaml.load()` API could execute arbitrary code. In other words, `yaml.safe_load` is not used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'PyYAML'}, 'ecosystem_specific': {'affected_functions': ['yaml.load', 'yaml.dump', 'safe_dump_all', 'safe_dump', 'yaml.CSafeLoader', 'yaml.CLoader', 'yaml.CSafeDumper', 'yaml.CDumper', 'yaml.SafeDumper', 'yaml.Dumper', 'yaml.SafeLoader', 'yaml.Loader']}, 'ranges': [{'type': 'E...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18342'}, {'type': 'WEB', 'url': 'https://github.com/marshmallow-code/apispec/issues/278'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/issues/193'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/pull/74'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:26Z', 'nvd_published_at': None}
1.4.0
GHSA-wjxj-f8rg-99wx
2023-03-01T20:05:50Z
2019-01-17T13:56:40Z
null
['CVE-2018-1320']
Improper Input Validation in Apache Thrift
Apache Thrift Java client library versions 0.5.0 prior to 0.9.3-1 and 0.10.0 prior to 0.12.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings ma...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.9.3-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2413'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/thrift'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/releases/tag/0.9.3.1'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-20', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:45Z', 'nvd_published_at': '2019-01-07T17:29:00Z'}
1.4.0
GHSA-cf66-xwfp-gvc4
2022-04-06T20:39:38Z
2019-01-04T17:40:59Z
null
['CVE-2018-14732']
Missing Origin Validation in webpack-dev-server
Versions of `webpack-dev-server` before 3.1.10 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated. ## Recommendation...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'webpack-dev-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14732'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/issues/1445'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/issues/1620'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:15Z', 'nvd_published_at': None}
1.4.0
GHSA-qqv6-5w6p-3pgr
2021-09-16T20:04:03Z
2019-01-04T17:43:30Z
null
['CVE-2018-20594']
Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons
An issue was discovered in hsweb 3.0.4. It is a reflected XSS vulnerability due to the absence of type parameter checking in FlowableModelManagerController.java.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.hswebframework.web:hsweb-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20594'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/issues/107'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/commit/b72a2275ed21240296c6539bae1049c56abb542f'}, {'type': 'ADVISORY', 'url': 'https://githu...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:34Z', 'nvd_published_at': None}
1.4.0
GHSA-8fg4-j562-mjrc
2022-09-14T22:38:08Z
2019-01-25T16:19:01Z
null
['CVE-2017-15720']
Improper Input Validation in Apache Airflow resulting in Remote Code Execution
In Apache Airflow 1.8.2 and earlier, an authenticated user can execute code remotely on the Airflow webserver by creating a special object.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15720'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8fg4-j562-mjrc'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:26Z', 'nvd_published_at': None}
1.4.0
GHSA-9mxf-g3x6-wv74
2022-09-14T22:31:12Z
2019-01-04T19:07:06Z
null
['CVE-2018-14721']
Server-Side Request Forgery (SSRF) in jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14721'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://a...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:04Z', 'nvd_published_at': None}
1.4.0
GHSA-337x-4q8g-prc5
2023-09-05T18:43:33Z
2019-01-14T16:20:05Z
null
['CVE-2019-3498']
Improper Input Validation in Django
In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in `django.views.defaults.page_not_found()`, leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted UR...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3498'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-337x-4q8g-prc5'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-ann...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:52Z', 'nvd_published_at': '2019-01-09T23:29:00Z'}
1.4.0
GHSA-645p-88qh-w398
2023-09-14T14:00:55Z
2019-01-04T19:06:55Z
null
['CVE-2018-14718']
Arbitrary Code Execution in jackson-databind
FasterXML jackson-databind 2.x before 2.9.7, 2.8.11.3, 2.7.9.5, and 2.6.7.3 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-data...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14718'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://a...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:52Z', 'nvd_published_at': '2019-01-02T18:29:00Z'}
1.4.0
GHSA-mh24-7wvg-v88g
2023-09-01T09:46:45Z
2019-01-30T20:56:26Z
null
['CVE-2019-6802']
CRLF Injection in pypiserver
CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP headers and possibly conduct XSS attacks via a `%0d%0a` in a URI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pypiserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6802'}, {'type': 'WEB', 'url': 'https://github.com/pypiserver/pypiserver/issues/237'}, {'type': 'WEB', 'url': 'https://github.com/pypiserver/pypiserver/commit/1375a67c55a9b8d4619df30d2a1c0b239d7357e6'}, {'type': 'ADVISORY', 'url': 'https://github.c...
{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:14Z', 'nvd_published_at': '2019-01-25T04:29:00Z'}
1.4.0
GHSA-54mg-vgrp-mwx9
2021-08-04T15:01:30Z
2019-05-14T04:01:37Z
null
['CVE-2019-11808']
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack
Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-session'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11808'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/issues/1448'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratp...
{'cwe_ids': ['CWE-338'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T03:48:09Z', 'nvd_published_at': '2019-05-07T07:29:00Z'}
1.4.0
GHSA-jgmr-wrwx-mgfj
2021-08-03T21:46:37Z
2019-05-14T04:02:35Z
null
['CVE-2019-3797']
Exposure of Sensitive Information to an Unauthorized Actor and SQL Injection in Spring Data JPA
This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ?startingWith?, ?endingWith? or ?containing? could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually def...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introd...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3797'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3797'}]
{'cwe_ids': ['CWE-200', 'CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-10T04:22:00Z', 'nvd_published_at': '2019-05-06T16:29:00Z'}
1.4.0
GHSA-wv67-9jq7-8r69
2021-08-03T21:47:43Z
2019-05-14T04:02:45Z
null
['CVE-2019-5432']
Improper Input Validation and Buffer Over-read in mqtt-packet
A specifically malformed MQTT Subscribe packet crashes MQTT Brokers using the mqtt-packet module versions < 3.5.1, 4.0.0 - 4.1.3, 5.0.0 - 5.6.1, 6.0.0 - 6.1.2 for decoding.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5432'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/541354'}]
{'cwe_ids': ['CWE-125', 'CWE-126'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-10T04:24:12Z', 'nvd_published_at': '2019-05-06T17:29:00Z'}
1.4.0
GHSA-2xv3-h762-ccxv
2020-08-31T18:31:05Z
2019-05-29T19:18:02Z
null
[]
Out-of-bounds Read in concat-with-sourcemaps
Versions of `concat-with-sourcemaps` before 1.0.6 allocates uninitialized Buffers when a number is passed as a separator. ## Recommendation Update to version 1.0.6 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'concat-with-sourcemaps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/320166'}, {'type': 'WEB', 'url': 'https://github.com/floridoo/concat-with-sourcemaps/blob/v1.0.5/index.js#L18'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/644'}]
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:17:27Z', 'nvd_published_at': None}
1.4.0
GHSA-37pw-qw47-4jxm
2021-05-11T16:17:59Z
2019-05-31T16:09:15Z
null
['CVE-2018-8029']
Privilege escalation vulnerability in Apache Hadoop
In Apache Hadoop versions 3.0.0-alpha1 to 3.1.0, 2.9.0 to 2.9.1, and 2.2.0 to 2.8.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'f...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8029'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0b8d58e02dbd0fb8bf7320c514fe58da1d6728bdc150f1ba04e0d9fc@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/17084c09e6dedf60efe08028b429...
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T16:08:38Z', 'nvd_published_at': None}
1.4.0
GHSA-6qh5-wx38-q92g
2020-08-31T18:22:04Z
2019-05-30T17:15:59Z
null
[]
Directory Traversal in ltt.js
Affected versions of `ltt.js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../.....
[]
[{'package': {'ecosystem': 'npm', 'name': 'ltt.js'}, 'versions': ['1.0.0']}]
[{'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt.js'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/ltt.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/411'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:15:20Z', 'nvd_published_at': None}
1.4.0
GHSA-72fv-qgj6-2w2p
2021-08-03T21:27:01Z
2019-05-01T18:37:08Z
null
['CVE-2015-9286']
Cross-site Scripting in NodeBB
Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9286'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/pull/3371'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/compare/56b79a9...4de7529'}, {'type': 'WEB', 'url': 'https://vulners.com/securityvulns/SECURITYVULNS:DOC:32625'},...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-01T18:20:32Z', 'nvd_published_at': '2019-04-30T14:29:00Z'}
1.4.0
GHSA-g86p-hgx5-2pfh
2022-03-04T21:16:27Z
2019-05-29T18:48:11Z
null
['CVE-2019-12300']
Improper Authentication in Buildbot
Buildbot before 1.8.2 and 2.x before 2.3.1 accepts a user-submitted authorization token from OAuth and uses it to authenticate a user. If an attacker has a token allowing them to read the user details of a victim, they can login as the victim.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'buildbot'}, 'ecosystem_specific': {'affected_functions': ['buildbot.www.oauth2.OAuth2Auth.acceptToken']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'buildbot'}, 'ecosystem_specific': {'af...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12300'}, {'type': 'PACKAGE', 'url': 'https://github.com/buildbot/buildbot'}, {'type': 'WEB', 'url': 'https://github.com/buildbot/buildbot/wiki/OAuth-vulnerability-in-using-submitted-authorization-token-for-authentication'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:47:56Z', 'nvd_published_at': '2019-05-23T15:30:00Z'}
1.4.0
GHSA-8v67-x8q5-3x3g
2021-08-04T14:53:05Z
2019-05-14T04:01:27Z
null
['CVE-2018-19048']
Cross-Site Scripting in simditor
Versions of `simditor` prior to 2.3.22 are vulnerable to Cross-Site Scripting. The package does not sanitize user input that is rendered with `innerHTML`, allowing attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 2.3.22 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'simditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19048'}, {'type': 'WEB', 'url': 'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd'}, {'type': 'WEB', 'url': 'https://github.com/hkglue/simditor_demo.git'}, {'type': 'WEB', 'url': 'https://github.com/hkglue/simd...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T01:08:11Z', 'nvd_published_at': None}
1.4.0
GHSA-5f7m-mmpc-qhh4
2022-08-03T20:30:06Z
2019-05-23T09:27:00Z
null
[]
mysql Node.JS Module Vulnerable to Remote Memory Exposure
Versions of `mysql` before 2.14.0 are vulnerable to remove memory exposure. Affected versions of `mysql` package allocate and send an uninitialized memory over the network when a number is provided as a password. Only `mysql` running on Node.js versions below 6.0.0 are affected due to a throw added in newer node.js v...
[]
[{'package': {'ecosystem': 'npm', 'name': 'mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha8'}, {'fixed': '2.14.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mysqljs/mysql/commit/192fe45593ba5768534afb6f2154432ca67a5002'}, {'type': 'WEB', 'url': 'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52'}, {'type': 'PACKAGE', 'url': 'https://github.com/mysqljs/mysql'}, {'type': 'WEB', 'url': 'https://www.npm...
{'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-23T07:40:10Z', 'nvd_published_at': None}
1.4.0
GHSA-7jfh-2xc9-ccv7
2020-08-31T18:29:45Z
2019-05-31T23:46:40Z
null
[]
Cross-Site Scripting in public
All versions of `public` are vulnerable to stored cross-site scripting (XSS). ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
[]
[{'package': {'ecosystem': 'npm', 'name': 'public'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'public'}, 'versions': ['0.1.5']}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/316346'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/609'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:44:38Z', 'nvd_published_at': None}