schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringclasses 11
values | aliases stringlengths 2 20 | summary stringlengths 4 172 | details stringlengths 47 3.95k | severity stringlengths 2 79 | affected stringlengths 76 3.32k | references stringlengths 82 11.3k | database_specific stringlengths 131 190 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-hvmf-r92r-27hr | 2021-08-19T16:04:59Z | 2019-12-04T21:26:28Z | null | ['CVE-2019-19118'] | Django allows unintended model editing | Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inlin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19118'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/103ebe2b5ff1b2614b85a52c239f471904d26244'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/36f580a17f0b3cb087deadf3b65eea024f479c21'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-04T19:44:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v63x-xc9j-hhvq | 2021-07-28T16:43:29Z | 2019-12-11T02:01:44Z | null | ['CVE-2019-10769'] | Sandbox Breakout / Arbitrary Code Execution in safer-eval | All versions of `safer-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context and is not suited to process arbitrary user input. This may allow attackers to execute arbitrary code in the system.
## Recommendation
The package is not meant to r... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'safer-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/commenthol/safer-eval/security/advisories/GHSA-v63x-xc9j-hhvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10769'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v63x-xc9j-hhvq'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK... | {'cwe_ids': ['CWE-20', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:57Z', 'nvd_published_at': '2019-12-06T23:15:00Z'} |
1.4.0 | GHSA-x92h-wmg2-6hp7 | 2021-08-19T15:18:27Z | 2019-12-02T18:10:24Z | null | ['CVE-2019-10913'] | Invalid HTTP method overrides allow possible XSS or other attacks in Symfony | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, HTTP Methods provided as verbs or using the override header may be treated as trusted input, but they are not validated, possibly causing SQL injection or XSS. This is related to symfony/http-foundation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10913'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.ya... | {'cwe_ids': ['CWE-79', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:49:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2mrj-435v-c2cr | 2020-06-16T20:41:51Z | 2019-12-02T18:15:31Z | 2020-06-16T20:15:24Z | [] | possible DoS caused by malformed signature decoding in Pure-Python ECDSA | **Withdrawn:** Duplicate of GHSA-pwfw-mgfj-7g3g. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14853'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14853'}, {'type': 'WEB', 'url': 'https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:15:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4328-8hgf-7wjr | 2022-08-11T00:00:45Z | 2019-12-13T15:39:32Z | null | ['CVE-2019-16777'] | npm Vulnerable to Global node_modules Binary Overwrite | Versions of the npm CLI prior to 6.13.4 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations.
For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packag... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16777'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:057... | {'cwe_ids': ['CWE-22', 'CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:02Z', 'nvd_published_at': '2019-12-13T01:15:00Z'} |
1.4.0 | GHSA-4mvc-qc5w-v5qr | 2023-09-20T19:22:55Z | 2019-12-17T22:53:34Z | null | ['CVE-2019-19712'] | Information disclosure in the Contao backend | ### Impact
Backend users can manipulate the details view URL to show pages and articles that have not been enabled for them.
### Patches
Update to Contao 4.4.46 or 4.8.6.
### Workarounds
None.
### References
https://contao.org/en/security-advisories/information-disclosure-in-the-back-end
### For more informatio... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.46'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_... | [{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-4mvc-qc5w-v5qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19712'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T19:35:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q58g-455p-8vw9 | 2021-10-29T14:10:27Z | 2019-12-16T19:30:17Z | null | ['CVE-2019-16779'] | In RubyGem excon, interrupted Persistent Connections May Leak Response Data | ### Impact
There was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'excon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.71.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16779'}, {'type': 'WEB', 'url': 'https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29'}, {'type': 'PACKAGE', 'url': 'https:/... | {'cwe_ids': ['CWE-362', 'CWE-664'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-16T19:28:10Z', 'nvd_published_at': '2019-12-16T20:15:00Z'} |
1.4.0 | GHSA-m6cx-g6qm-p2cx | 2021-10-21T21:16:09Z | 2019-12-13T15:39:19Z | null | ['CVE-2019-16775'] | Arbitrary File Write in npm | Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to create files on a user's system when t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16775'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:057... | {'cwe_ids': ['CWE-59', 'CWE-61'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:50Z', 'nvd_published_at': '2019-12-13T01:15:00Z'} |
1.4.0 | GHSA-rh46-3fgc-mvrf | 2021-08-19T16:05:30Z | 2019-12-04T21:25:28Z | null | ['CVE-2019-19507'] | Validation bypass is possible in Json Pattern Validator | In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the ty... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jpv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19507'}, {'type': 'WEB', 'url': 'https://github.com/manvel-khnkoyan/jpv/issues/6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jpv'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-04T19:47:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qhrx-hcm6-pmrw | 2023-01-17T13:55:02Z | 2019-12-02T18:12:26Z | null | ['CVE-2019-11458'] | Unsafe deserialization in SmtpTransport in CakePHP | An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.15'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11458'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html'}, {'type': 'WEB', 'url': 'http... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T00:51:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-484f-743f-6jx2 | 2022-07-05T18:07:34Z | 2019-12-12T22:50:20Z | null | ['CVE-2019-16774'] | Object injection in cookie driver in phpfastcache | ### Impact
An possible object injection has been discovered in cookie driver prior 5.0.13 versions (of 5.x releases).
### Patches
The issue has been addressed by enforcing JSON conversion when deserializing
### Workarounds
If you can't fix it, use another driver such as "Files" (Filesystem)
### References
Fixing rel... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpfastcache/phpfastcache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.13'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-484f-743f-6jx2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16774'}, {'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/commit/c4527205cb7a402b595790c74310791f5b04a1a4'},... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6xc2-mj39-q599 | 2022-08-02T15:09:07Z | 2019-12-02T18:20:41Z | null | ['CVE-2019-18818'] | Strapi allows unauthenticated attacker to reset admin password without valid reset token | Versions of `strapi` prior to 3.0.0-beta.17.5 are vulnerable to Privilege Escalation. The password reset routes allows an unauthenticated attacker to reset an admin's password without providing a valid password reset token.
## Recommendation
Upgrade to version 3.0.0-beta.17.5 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-beta.17.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.17.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18818'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/4443'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18818'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-640'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:36:24Z', 'nvd_published_at': '2019-11-07T22:15:00Z'} |
1.4.0 | GHSA-x8qc-rrcw-4r46 | 2022-08-10T23:58:46Z | 2019-12-13T15:39:26Z | null | ['CVE-2019-16776'] | npm symlink reference outside of node_modules | Versions of the npm CLI prior to 6.13.3 are vulnerable to a symlink reference outside of node_modules. It is possible for packages to create symlinks to files outside of the`node_modules` folder through the `bin` field upon installation. A properly constructed entry in the package.json bin field would allow a package p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16776'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:057... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:49Z', 'nvd_published_at': '2019-12-13T01:15:00Z'} |
1.4.0 | GHSA-79gr-58r3-pwm3 | 2023-09-21T19:46:51Z | 2019-12-02T18:07:16Z | null | ['CVE-2019-18889'] | Symfony Unsafe Cache Serialization Could Enable RCE | An issue was discovered in Symfony 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. Serializing certain cache adapter interfaces could result in remote code injection. This is related to symfony/cache. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.4.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ecosystem_specific': {'affected_functions'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18889'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-18889.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-1... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:45:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-844w-j86r-4x2j | 2021-11-01T14:12:42Z | 2019-12-16T20:17:10Z | null | ['CVE-2019-16778'] | Heap buffer overflow in `UnsortedSegmentSum` in TensorFlow | ### Impact
A heap buffer overflow in `UnsortedSegmentSum` can be produced when the `Index` template argument is `int32`. In this case `data_size` and `num_segments` fields are truncated from `int64` to `int32` and can produce negative numbers, resulting in accessing out of bounds heap memory.
This is unlikely to be e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}, {'package': {'ecosystem':... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-844w-j86r-4x2j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16778'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-122', 'CWE-681'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-12-16T20:16:12Z', 'nvd_published_at': '2019-12-16T21:15:00Z'} |
1.4.0 | GHSA-hrqr-hxpp-chr3 | 2021-11-03T14:59:03Z | 2019-12-18T19:01:31Z | null | ['CVE-2019-16782'] | Possible Information Leak / Session Hijack Vulnerability in Rack | There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16782'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-18T19:01:07Z', 'nvd_published_at': '2019-12-18T20:15:00Z'} |
1.4.0 | GHSA-m5ff-3wj3-8ph4 | 2019-12-26T16:34:06Z | 2019-12-26T16:34:38Z | null | [] | HTTP Request Smuggling: Invalid whitespace characters in headers in Waitress | ### Impact
If a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling.
```
Content-Length: 10
Transfer-Encoding: [\x0b]chunked
```
For clarity:
```
0x0b == vertical ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.parse_header']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017'}] | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T16:34:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fpff-384j-vxq7 | 2021-08-19T15:10:08Z | 2019-12-02T18:05:13Z | null | ['CVE-2019-10763'] | Data leakage via SQL Injection in Pimcore | pimcore/pimcore before 6.3.0 is vulnerable to SQL Injection. An attacker with limited privileges (classes permission) can achieve a SQL injection that can lead in data leakage. The vulnerability can be exploited via 'id', 'storeId', 'pageSize' and 'tables' parameters, using a payload for trigger a time based or error b... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10763'}, {'type': 'WEB', 'url': 'https://blog.certimetergroup.com/it/articolo/security/sql_injection_in_pimcore_6.2.3'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-480391'}] | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:55:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6rmq-x2hv-vxpp | 2023-09-08T14:19:06Z | 2019-12-02T18:11:25Z | null | ['CVE-2019-6338'] | Drupal core third-party PEAR Archive_Tar library is vulnerable to Deserialization of Untrusted Data | In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; Drupal core uses the third-party PEAR Archive_Tar library. This library has released a security update which impacts some Drupal configurations. Refer to CVE-2018-1000888 for details | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.62.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6338'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6338.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/02/msg00032.html'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T00:34:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4vpc-5jx4-cfqg | 2021-07-28T15:49:16Z | 2019-12-02T18:09:21Z | null | ['CVE-2019-18886'] | User enumeration leak using switch user functionality in Symfony | An issue was discovered in Symfony 4.2.0 to 4.2.11 and 4.3.0 to 4.3.7. The ability to enumerate users was possible due to different handling depending on whether the user existed when making unauthorized attempts to use the switch users functionality. This is related to symfony/security. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18886'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-18886.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CV... | {'cwe_ids': ['CWE-200', 'CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:47:26Z', 'nvd_published_at': '2019-11-21T18:15:00Z'} |
1.4.0 | GHSA-g2xc-35jw-c63p | 2022-04-25T23:07:24Z | 2019-12-20T23:04:18Z | null | ['CVE-2019-16786'] | HTTP Request Smuggling: Invalid Transfer-Encoding in Waitress | ### Impact
Waitress would parse the `Transfer-Encoding` header and only look for a single string value, if that value was not `chunked` it would fall through and use the `Content-Length` header instead.
According to the HTTP standard `Transfer-Encoding` should be a comma separated list, with the inner-most encoding f... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.received', 'waitress.parser.HTTPRequestParser.parse_header', 'waitress.parser.get_header_lines', 'waitress.receiver.ChunkedReceiver', 'waitress.receiver.ChunkedReceiver.received', 'wa... | [{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16786'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-20T23:01:53Z', 'nvd_published_at': '2019-12-20T23:15:00Z'} |
1.4.0 | GHSA-h9rv-jmmf-4pgx | 2021-01-08T18:42:22Z | 2019-12-05T18:44:37Z | null | ['CVE-2019-16769'] | Cross-Site Scripting in serialize-javascript | Versions of `serialize-javascript` prior to 2.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications.
## Recommendation
Upgrade to version 2.1.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'serialize-javascript'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-h9rv-jmmf-4pgx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16769'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h9rv-jmmf-4pgx'}, {'type': 'WEB', 'url': 'https://www.npmjs.co... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6rjc-4pwr-3vp7 | 2021-08-19T15:34:42Z | 2019-12-02T18:14:30Z | null | ['CVE-2019-10771'] | Cross-Site Scripting in iobroker.web | Versions of `iobroker.web` prior to 2.4.10 are vulnerable to Cross-Site Scripting. The package fails to escape URL parameters that may be reflected in the server response. This can be used by attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 2.4.10 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'iobroker.web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10771'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IOBROKERWEB-534971'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1345'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:13:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9xcj-c8cr-8c3c | 2022-10-07T20:34:53Z | 2019-12-26T18:22:26Z | null | ['CVE-2019-17563'] | In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack | When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.99'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intro... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17563'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T18:22:01Z', 'nvd_published_at': '2019-12-23T17:15:00Z'} |
1.4.0 | GHSA-4ppp-gpcr-7qf6 | 2022-03-24T17:52:19Z | 2019-12-20T23:04:35Z | null | [] | HTTP Request Smuggling: Content-Length Sent Twice in Waitress | ### Impact
Waitress would header fold a double `Content-Length` header and due to being unable to cast the now comma separated value to an integer would set the `Content-Length` to 0 internally.
So a request with:
```
Content-Length: 10
Content-Length: 10
```
would get transformed to:
```
Content-Length: 10, 10
``... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.parse_header']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'}, {'type': 'WEB', 'url': 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'}, {'typ... | {'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-20T23:02:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cmch-296j-wfvw | 2021-08-19T15:11:15Z | 2019-12-02T18:06:14Z | null | ['CVE-2019-10767'] | Arbitrary File Write in iobroker.js-controller | Versions of `iobroker.controller` prior to 2.0.25 are vulnerable to Path Traversal. The package fails to restrict access to folders outside of the intended `/adapter/<adapter-name>` folder, which may allow attackers to include arbitrary files in the system. An attacker would need to be authenticated to perform the atta... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'iobroker.js-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.25'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10767'}, {'type': 'WEB', 'url': 'https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T03:26:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-26p8-xrj2-mv53 | 2021-08-19T16:02:34Z | 2019-12-02T18:18:37Z | null | ['CVE-2019-10083'] | Apache NiFi process group information disclosure | When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10083'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2019-10083'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:30:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h47j-hc6x-h3qq | 2023-09-12T18:35:46Z | 2019-12-30T19:30:31Z | null | ['CVE-2019-10758'] | Remote Code Execution Vulnerability in NPM mongo-express | ### Impact
Remote code execution on the host machine by any authenticated user.
### Proof Of Concept
Launching mongo-express on a Mac, pasting the following into the "create index" field will pop open the Mac calculator:
```javascript
this.constructor.constructor("return process")().mainModule.require('child_proces... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mongo-express'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.54.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10758'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/pull/522'}, {'type': 'WEB', 'url': 'https://github.com... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-30T19:29:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7xxv-wpxj-mx5v | 2023-09-05T14:45:56Z | 2019-12-02T18:03:09Z | null | ['CVE-2019-19275'] | typed-ast Out-of-bounds Read | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'typed-ast'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19275'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:25:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4x6v-rwh4-55jw | 2023-09-08T19:57:36Z | 2019-12-02T18:16:34Z | null | ['CVE-2019-18954'] | Pomelo allows external control of critical state data | Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in `template/game-server/app/servers/connector/handler/entryHandler.js` because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipul... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'pomelo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18954'}, {'type': 'WEB', 'url': 'https://github.com/NetEase/pomelo/issues/1149'}, {'type': 'WEB', 'url': 'https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation'}] | {'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:20:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hh3j-x4mc-g48r | 2022-04-19T18:42:25Z | 2019-12-26T18:22:36Z | null | ['CVE-2019-12418'] | Insufficiently Protected Credentials in Apache Tomcat | When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords use... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.99'}]}], 'database_specific': {'last_known_affected_version_range': '< 7.0.98'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12418'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5... | {'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T18:22:10Z', 'nvd_published_at': '2019-12-23T18:15:00Z'} |
1.4.0 | GHSA-35fr-h7jr-hh86 | 2021-04-27T18:03:07Z | 2019-12-06T18:55:47Z | null | [] | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') in Armeria | Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response.
### Impact
1. Cross-User Defacement
2. Cache Poisoning
3. Cros... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.linecorp.armeria:armeria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.85.0'}, {'fixed': '0.97.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86'}] | {'cwe_ids': ['CWE-113', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T18:03:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5h9j-q6j2-253f | 2021-06-15T17:23:03Z | 2019-12-02T18:13:28Z | null | ['CVE-2019-17632'] | Unescaped exception messages in error responses in Jetty | In Eclipse Jetty versions 9.4.21.v20190926, 9.4.22.v20191022, and 9.4.23.v20191118, the generation of default unhandled Error response content (in text/html and text/json Content-Type) does not escape Exception messages in stacktraces included in error output. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.21.v20190926'}, {'fixed': '9.4.24.v20191120'}]}], 'versions': ['9.4.21.v20190926']}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17632'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=553443'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAITZ27GKPD2CCNHGT2VBT4VWIBUJJNS/'}, {'t... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:09:14Z', 'nvd_published_at': '2019-11-25T22:15:00Z'} |
1.4.0 | GHSA-hm6q-r2jc-cpqh | 2023-09-06T20:10:25Z | 2019-12-16T19:29:33Z | null | ['CVE-2019-19771'] | lodahs is malware | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a d... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'lodahs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19771'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1417'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/lodahs'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-15T14:26:04Z', 'nvd_published_at': '2019-12-12T20:15:00Z'} |
1.4.0 | GHSA-m3jw-62m7-jjcm | 2023-09-05T14:46:42Z | 2019-12-02T18:02:02Z | null | ['CVE-2019-19274'] | typed-ast Out-of-bounds Read | typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'typed-ast'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19274'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:13:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-744r-vv2g-2x6g | 2021-06-15T17:22:36Z | 2019-12-02T18:17:36Z | null | ['CVE-2019-10080'] | Apache NiFi information disclosure by XXE | The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10080'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3507'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:27:21Z', 'nvd_published_at': '2019-11-19T22:15:00Z'} |
1.4.0 | GHSA-fmqw-vqh5-cwq9 | 2021-08-19T16:03:16Z | 2019-12-02T18:19:39Z | null | ['CVE-2019-12421'] | Apache NiFi user log out issue | When using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-security'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-api'}, 'ecosystem_speci... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12421'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3362'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/cf6f5172503ce438c6c22c334c9367f774db7b24'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca3... | {'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:32:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7xx3-m584-x994 | 2021-01-08T19:12:47Z | 2019-12-05T19:26:37Z | null | ['CVE-2019-16770'] | A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack | ## Keepalive thread overload/DoS
### Impact
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack.
If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends re... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16770'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7xx3-m584-x994'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advis... | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:51Z', 'nvd_published_at': '2019-12-05T20:15:00Z'} |
1.4.0 | GHSA-jc43-qrrp-98f5 | 2023-04-25T16:31:36Z | 2019-12-17T22:53:40Z | null | ['CVE-2019-19714'] | Insert tag injection in the Contao login module | ### Impact
It is possible to inject insert tags into the login module which will be replaced when the page is rendered.
### Patches
Update to Contao 4.8.6.
### Workarounds
None.
### References
https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module
### For more information
If you hav... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.4'}, {'fixed': '4.8.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-jc43-qrrp-98f5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19714'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T19:35:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-42fp-4hm3-j8r7 | 2021-08-31T21:37:18Z | 2019-01-04T17:46:08Z | null | ['CVE-2017-5934'] | Moderate severity vulnerability that affects moin | Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'moin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5934'}, {'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-42fp-4hm3-j8r7'}, {'type': 'PACKAGE', 'url': 'https://github.com... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-45r8-3495-x6rm | 2022-09-17T00:06:13Z | 2019-01-04T17:43:36Z | null | ['CVE-2018-18893'] | Jinjava calls getClass | Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.hubspot.jinjava:jinjava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18893'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/pull/230'}, {'type': 'PACKAGE', 'url': 'https://github.com/HubSpot/jinjava'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/blob/master/CHANGES.md'}, {'type': 'ADVISOR... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4rm3-4mq4-mfwr | 2022-09-14T22:29:42Z | 2019-01-04T17:43:22Z | null | ['CVE-2018-20595'] | Cross-Site Request Forgery (CSRF) in hswebframework.web:hsweb-commons | A CSRF issue was discovered in web/authorization/oauth2/controller/OAuth2ClientController.java in hsweb 3.0.4 because the state parameter in the request is not compared with the state parameter in the session after user authentication is successful. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.hswebframework.web:hsweb-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20595'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/issues/107'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2'}, {'type': 'ADVISORY', 'url': 'https://githu... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wr5r-m8pc-85j9 | 2020-06-16T22:01:07Z | 2019-01-25T16:18:49Z | null | ['CVE-2019-3772'] | Low severity vulnerability that affects org.springframework.integration:spring-integration-ws and org.springframework.integration:spring-integration-xml | Spring Integration (spring-integration-xml and spring-integration-ws modules), versions 4.3.18, 5.0.10, 5.1.1, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-xml'}, 'ranges': [{'type': 'ECOS... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3772'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wr5r-m8pc-85j9'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3772'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5... | {'cwe_ids': ['CWE-611'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m9mq-p2f9-cfqv | 2023-08-08T10:24:53Z | 2019-01-04T17:46:30Z | null | ['CVE-2018-7753'] | Bleach URI Scheme Restriction Bypass | An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'bleach'}, 'ecosystem_specific': {'affected_functions': ['bleach.sanitizer.BleachSanitizerFilter.allow_token']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7753'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/892252'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m9mq-p2f9... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2x54-j4m3-r6wx | 2023-08-07T15:57:08Z | 2019-01-04T17:44:48Z | null | ['CVE-2019-3575'] | sqla-yaml-fixtures is vulnerable to Code Injection | Sqla_yaml_fixtures versions up to 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in `sqla_yaml_fixtures.load`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'sqla-yaml-fixtures'}, 'ecosystem_specific': {'affected_functions': ['sqla_yaml_fixtures.load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3575'}, {'type': 'WEB', 'url': 'https://github.com/schettino72/sqla_yaml_fixtures/issues/20'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2x54-j4m3-r6wx'}, {'type': 'PACKAGE', 'url': 'https://github.com/schettino72/sqla_yaml_fi... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6qvp-r6r3-9p7h | 2023-08-26T00:01:34Z | 2019-01-17T14:05:03Z | null | ['CVE-2018-14404'] | Nokogiri NULL Pointer Dereference | A NULL pointer dereference vulnerability exists in the `xpath.c:xmlXPathCompOpEval()` function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the `XPATH_OP_AND` or `XPATH_OP_OR` case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a den... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14404'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1785'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1543'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817'},... | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4p24-vmcr-4gqj | 2023-08-25T23:47:33Z | 2019-01-17T13:57:27Z | null | ['CVE-2016-10735'] | Bootstrap XSS vulnerability | In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute. Note that this is a different vulnerability than CVE-2018-14041.
See https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ for more info. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10735'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/20184'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/23679... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:39Z', 'nvd_published_at': '2019-01-09T05:29:00Z'} |
1.4.0 | GHSA-8222-6fc8-mhvf | 2021-06-15T16:59:20Z | 2019-01-25T16:18:52Z | null | ['CVE-2019-3773'] | Vulnerability that affects org.springframework.ws:spring-ws and org.springframework.ws:spring-xml | Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3773'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8222-6fc8-mhvf'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3773'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type'... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:54Z', 'nvd_published_at': '2019-01-18T22:29:00Z'} |
1.4.0 | GHSA-r28v-mw67-m5p9 | 2023-09-05T12:37:34Z | 2019-01-04T17:50:07Z | null | ['CVE-2018-7536'] | Django Denial-of-service possibility in urlize and urlizetrunc template filters | An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The `django.utils.html.urlize()` function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The `urlize(... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7536'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-185'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:19Z', 'nvd_published_at': '2018-03-09T20:29:00Z'} |
1.4.0 | GHSA-mc23-976p-j42x | 2022-12-18T23:44:26Z | 2019-01-14T16:19:55Z | null | ['CVE-2019-0542'] | xterm vulnerable to remote code execution | A remote code execution vulnerability exists in Xterm.js when the component mishandles special characters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'xterm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'xterm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.2'}]}]}, {'package': {'ecosystem': 'npm', 'n... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0542'}, {'type': 'WEB', 'url': 'https://github.com/xtermjs/xterm.js/commit/3592c641cd0348e0b698e8a180aea2072c6bcd9a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/erra... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:48Z', 'nvd_published_at': '2019-01-09T15:29:00Z'} |
1.4.0 | GHSA-f9hv-mg5h-xcw9 | 2023-06-12T22:34:10Z | 2019-01-04T19:06:57Z | null | ['CVE-2018-19360'] | Deserialization of Untrusted Data in jackson-databind due to polymorphic deserialization | FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19360'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://a... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4q69-q4q7-x82c | 2023-09-06T20:01:34Z | 2019-01-04T17:41:46Z | null | ['CVE-2017-18353'] | rendertron can remotely shut down Chrome instance | Rendertron 1.0.0 includes an `_ah/stop` route to shutdown the Chrome instance responsible for serving render requests to all users. Visiting this route with a GET request allows any unauthorized remote attacker to disable the core service of the application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18353'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromi... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-77rc-x84q-pv4f | 2022-09-14T22:41:33Z | 2019-01-25T16:19:19Z | null | ['CVE-2018-20245'] | Improper Certificate Validation in Apache Airflow | The LDAP auth backend (airflow.contrib.auth.backends.ldap_auth) prior to Apache Airflow 1.10.1 was misconfigured and contained improper checking of exceptions which disabled server certificate checking. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20245'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-77rc-x84q-pv4f'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b549c7573b342a6e457e5a3225c33054244343927bbfb2a4cdc4cf73@%3Cdev.airflow.apache.org%3E'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3wc8-659g-r88q | 2020-06-16T20:56:44Z | 2019-01-25T16:18:56Z | null | ['CVE-2019-3774'] | Low severity vulnerability that affects org.springframework.batch:spring-batch-core | Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.batch:spring-batch-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.batch:spring-batch-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'i... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3774'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3wc8-659g-r88q'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01292194daa9ed3117b34dabec0c26929f6db13b9613fc144f720d52@%3Cissues.servicemix.apache.org%3E'}, {... | {'cwe_ids': ['CWE-611'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9gqg-3fxr-9hv7 | 2023-08-30T23:28:15Z | 2019-01-25T16:19:09Z | null | ['CVE-2017-17836'] | Apache Airflow vulnerable to XSS | In Apache Airflow 1.8.2 and earlier, an experimental Airflow feature displayed authenticated cookies, as well as passwords to databases used by Airflow. An attacker who has limited access to airflow, weather it be via XSS or by leaving a machine unlocked can exfil all credentials from the system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17836'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9gqg-3fxr-9hv7'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-38rv-5jqc-m2cv | 2023-09-01T20:25:56Z | 2019-01-04T17:48:09Z | null | ['CVE-2017-0906'] | Recurly vulnerable to SSRF | The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.2 is vulnerable to a Server-Side Request Forgery vulnerability in the `Resource.get` method that could result in compromise of API keys or other critical resources. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0906'}, {'type': 'WEB', 'url': 'https://github.com/recurly/recurly-client-python/commit/049c74699ce93cf126feff06d632ea63fba36742'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288635'}, {'type': 'ADVISORY', 'url': 'https://github.com/advi... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3mgp-fx93-9xv5 | 2023-01-23T20:33:58Z | 2019-01-17T13:57:34Z | null | ['CVE-2018-20676'] | XSS vulnerability that affects bootstrap | In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20676'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27044'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/279... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:33Z', 'nvd_published_at': '2019-01-09T05:29:00Z'} |
1.4.0 | GHSA-7qqv-r2q4-jxhm | 2021-09-03T21:43:07Z | 2019-01-14T16:19:31Z | null | ['CVE-2018-1000809'] | High severity vulnerability that affects privacyIDEA | privacyIDEA version 2.23.1 and earlier contains a Improper Input Validation vulnerability in token validation api that can result in Denial-of-Service. This attack appear to be exploitable via http request with user=<space>&pass= to /validate/check url. This vulnerability appears to have been fixed in 2.23.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'privacyIDEA'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.23.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000809'}, {'type': 'WEB', 'url': 'https://github.com/privacyidea/privacyidea/issues/1227'}, {'type': 'WEB', 'url': 'https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751'}, {'type': 'ADVISORY', 'url': 'https://... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-68wv-rjrm-576p | 2022-09-14T22:40:56Z | 2019-01-25T16:19:14Z | null | ['CVE-2017-17835'] | Cross-Site Request Forgery (CSRF) in Apache Airflow | In Apache Airflow 1.8.2 and earlier, a CSRF vulnerability allowed for a remote command injection on a default install of Airflow. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17835'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-68wv-rjrm-576p'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ph58-4vrj-w6hr | 2023-01-23T21:29:22Z | 2019-01-17T13:57:56Z | null | ['CVE-2018-20677'] | bootstrap Cross-site Scripting vulnerability | In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20677'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27045'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/279... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:11Z', 'nvd_published_at': '2019-01-09T05:29:00Z'} |
1.4.0 | GHSA-mx9v-gmh4-mgqw | 2022-09-14T22:31:36Z | 2019-01-04T19:07:01Z | null | ['CVE-2018-19361'] | Deserialization of Untrusted Data in jackson-databind | FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.j... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19361'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://a... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j87c-cj65-vmh5 | 2023-09-06T20:06:31Z | 2019-01-04T17:41:51Z | null | ['CVE-2017-18354'] | rendertron LFI vulnerability | Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18354'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromi... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xvwv-6wvx-px9x | 2023-09-01T21:13:18Z | 2019-01-04T17:47:21Z | null | ['CVE-2017-1000484'] | Plone Open Redirect | By linking to a specific url in Plone 2.5-5.1rc1 with a parameter, an attacker could send you to his own website. On its own this is not so bad: the attacker could more easily link directly to his own website instead. But in combination with another attack, you could be sent to the Plone login form and login, then get ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000484'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/2232'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xvwv-6wvx-px9x'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'W... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mvjj-gqq2-p4hw | 2023-09-13T19:45:25Z | 2019-01-04T19:05:35Z | null | ['CVE-2018-6341'] | Cross-Site Scripting in react-dom | Affected versions of `react-dom` are vulnerable to Cross-Site Scripting (XSS). The package fails to validate attribute names in HTML tags which may lead to Cross-Site Scripting in specific scenarios. This may allow attackers to execute arbitrary JavaScript in the victim's browser. To be affected by this vulnerability, ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.0.1'}]}], 'versions': ['16.0.0']}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_funct... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6341'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mvjj-gqq2-p4hw'}, {'type': 'WEB', 'url': 'https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:react-dom:20180802'}, {'ty... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-chj8-5xgw-wcvj | 2021-09-09T18:04:45Z | 2019-01-07T19:14:46Z | null | ['CVE-2016-8750'] | Moderate severity vulnerability that affects org.apache.karaf:apache-karaf | Apache Karaf prior to 4.0.8 used the LDAPLoginModule to authenticate users to a directory via LDAP. However, it did not encoding usernames properly and hence was vulnerable to LDAP injection attacks leading to a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8750'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1322'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-chj8-5xgw-wcvj'}, {'type': 'WEB', 'url': 'https://karaf.apache.org/security/cve-2016-8750.txt'}, {'ty... | {'cwe_ids': ['CWE-90'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-98gj-wwxm-cj3h | 2023-08-07T16:27:52Z | 2019-01-04T17:47:50Z | null | ['CVE-2017-16876'] | mistune Cross-site scripting (XSS) vulnerability | Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the "key" argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mistune'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16876'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1524596'}, {'type': 'ADVISORY', 'url': 'https://github.com/ad... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vx85-mj8c-4qm6 | 2023-09-11T18:30:27Z | 2019-01-17T13:56:33Z | null | ['CVE-2018-11798'] | Apache Thrift Node.js static web server sandbox escape | The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.2'}, {'fixed': '0.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11798'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/pull/1606'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/commit/2a2b72f6c8aef200ecee4984f011e06052288ff2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA... | {'cwe_ids': ['CWE-538'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-37hp-765x-j95x | 2023-09-05T14:07:04Z | 2019-01-04T17:50:26Z | null | ['CVE-2017-7233'] | Django Open redirect and possible XSS attack via user-supplied numeric redirect URLs | Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnera... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10'}, {'fixed': '1.10.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'typ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7233'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1445'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1451'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1462'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c8hm-7hpq-7jhg | 2021-06-10T23:51:07Z | 2019-01-04T19:07:03Z | null | ['CVE-2018-19362'] | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19362'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://a... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4gq5-ch57-c2mg | 2023-09-13T18:31:09Z | 2019-01-04T19:09:49Z | null | ['CVE-2018-14719'] | Arbitrary Code Execution in jackson-databind | FasterXML jackson-databind 2.x before 2.9.7, 2.8.11.3, and 2.7.9.5 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-data... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14719'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://a... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:21Z', 'nvd_published_at': '2019-01-02T18:29:00Z'} |
1.4.0 | GHSA-cq9c-55r7-455x | 2022-09-14T22:34:31Z | 2019-01-07T19:14:51Z | null | ['CVE-2018-11787'] | Improper Authentication in Apache Karaf | In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11787'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cq9c-55r7-455x'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/KARAF-4993'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d9ba4c3104ba32225646... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-29gp-92wp-94q8 | 2022-08-03T19:36:45Z | 2019-01-04T17:41:20Z | null | ['CVE-2018-6342'] | react-dev-utils on Windows vulnerable to Remote Code Execution | `react-dev-utils` on Windows is vulnerable to remote code execution.
## Recommendation
Update to one of the following versions, depending on the release line that you are using.
- 1.0.4
- 2.0.2
- 3.1.2
- 4.2.2
- 5.0.2
- 6.0.0-next.a671462c | [] | [{'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6342'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/pull/4866'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-29gp-92wp-94q8'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/create-react-app'}, ... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:46Z', 'nvd_published_at': '2018-12-31T22:29:00Z'} |
1.4.0 | GHSA-2f9x-5v75-3qv4 | 2023-09-05T14:06:09Z | 2019-01-04T17:50:00Z | null | ['CVE-2018-7537'] | Django Denial-of-service possibility in truncatechars_html and truncatewords_html template filters | An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. T... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7537'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0265'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2f9x-5v75-3qv4'}, {'type':... | {'cwe_ids': ['CWE-185'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h4hv-m4h4-mhwg | 2023-09-05T18:19:49Z | 2019-01-04T17:50:17Z | null | ['CVE-2017-7234'] | Django open redirect | A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the `django.views.static.serve()` view could redirect to any other domain, aka an open redirect vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10'}, {'fixed': '1.10.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'typ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7234'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h4hv-m4h4-mhwg'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170429023907/http://www.securitytracker.... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j88m-953w-8r2c | 2023-09-06T20:07:11Z | 2019-01-07T19:14:21Z | null | ['CVE-2017-18352'] | rendertron XSS vulnerability | Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18352'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromi... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q485-j897-qc27 | 2022-09-14T22:34:12Z | 2019-01-07T19:14:34Z | null | ['CVE-2018-20433'] | XML External Entity Reference in mchange:c3p0 | c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.mchange:c3p0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.5.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20433'}, {'type': 'WEB', 'url': 'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q485-j897-qc27'}, {'type': 'PACKAGE', 'url': 'https://github.com/zh... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-92wj-x78c-m4fx | 2023-09-11T22:40:24Z | 2019-01-07T19:14:49Z | null | ['CVE-2018-11788'] | XML External Entity Reference in Apache Karaf | Apache Karaf provides a features deployer, which allows users to "hot deploy" a features XML by dropping the file directly in the deploy folder. The features XML is parsed by XMLInputFactory class. Apache Karaf XMLInputFactory class doesn't contain any mitigation codes against XXE. This is a potential security risk as ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.specs:org.apache.karaf.specs.java.xml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.specs:org.a... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11788'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/commit/0c36c50bc158739c8fc8543122a6740c54adafca'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/karaf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227101219/ht... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9r8w-6x8c-6jr9 | 2023-09-05T17:57:28Z | 2019-01-04T17:50:34Z | null | ['CVE-2017-12794'] | Django vulnerable to XSS on 500 pages | In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with `DEBUG ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12794'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9r8w-6x8c-6jr9'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3559-1/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170927072701/http://www.securitytracker.com/i... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jhjh-ghwx-6h7r | 2023-09-01T09:30:29Z | 2019-01-17T13:56:18Z | null | ['CVE-2017-1002157'] | modulemd uses an unsafe function for processing externally provided data | modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'modulemd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002157'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhjh-ghwx-6h7r'}, {'type': 'PACKAGE', 'url': 'https://github.com/xsuchy/modulemd'}, {'type': 'WEB', 'url': 'https://pagure.io/modulemd/issue/55'}] | {'cwe_ids': ['CWE-20', 'CWE-242'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:31Z', 'nvd_published_at': '2019-01-10T21:29:00Z'} |
1.4.0 | GHSA-x2w5-5m2g-7h5m | 2023-06-12T22:34:49Z | 2019-01-04T19:09:46Z | null | ['CVE-2018-14720'] | XML External Entity Reference (XXE) in jackson-databind | FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14720'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://a... | {'cwe_ids': ['CWE-502', 'CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rprw-h62v-c2w7 | 2023-09-05T17:58:47Z | 2019-01-04T17:45:26Z | null | ['CVE-2017-18342'] | PyYAML insecurely deserializes YAML strings leading to arbitrary code execution | In PyYAML before 4.1, the `yaml.load()` API could execute arbitrary code. In other words, `yaml.safe_load` is not used. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'PyYAML'}, 'ecosystem_specific': {'affected_functions': ['yaml.load', 'yaml.dump', 'safe_dump_all', 'safe_dump', 'yaml.CSafeLoader', 'yaml.CLoader', 'yaml.CSafeDumper', 'yaml.CDumper', 'yaml.SafeDumper', 'yaml.Dumper', 'yaml.SafeLoader', 'yaml.Loader']}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18342'}, {'type': 'WEB', 'url': 'https://github.com/marshmallow-code/apispec/issues/278'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/issues/193'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/pull/74'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wjxj-f8rg-99wx | 2023-03-01T20:05:50Z | 2019-01-17T13:56:40Z | null | ['CVE-2018-1320'] | Improper Input Validation in Apache Thrift | Apache Thrift Java client library versions 0.5.0 prior to 0.9.3-1 and 0.10.0 prior to 0.12.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings ma... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.9.3-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2413'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/thrift'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/releases/tag/0.9.3.1'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-20', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:45Z', 'nvd_published_at': '2019-01-07T17:29:00Z'} |
1.4.0 | GHSA-cf66-xwfp-gvc4 | 2022-04-06T20:39:38Z | 2019-01-04T17:40:59Z | null | ['CVE-2018-14732'] | Missing Origin Validation in webpack-dev-server | Versions of `webpack-dev-server` before 3.1.10 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated.
## Recommendation... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'webpack-dev-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14732'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/issues/1445'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/issues/1620'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qqv6-5w6p-3pgr | 2021-09-16T20:04:03Z | 2019-01-04T17:43:30Z | null | ['CVE-2018-20594'] | Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons | An issue was discovered in hsweb 3.0.4. It is a reflected XSS vulnerability due to the absence of type parameter checking in FlowableModelManagerController.java. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.hswebframework.web:hsweb-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20594'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/issues/107'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/commit/b72a2275ed21240296c6539bae1049c56abb542f'}, {'type': 'ADVISORY', 'url': 'https://githu... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8fg4-j562-mjrc | 2022-09-14T22:38:08Z | 2019-01-25T16:19:01Z | null | ['CVE-2017-15720'] | Improper Input Validation in Apache Airflow resulting in Remote Code Execution | In Apache Airflow 1.8.2 and earlier, an authenticated user can execute code remotely on the Airflow webserver by creating a special object. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15720'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8fg4-j562-mjrc'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9mxf-g3x6-wv74 | 2022-09-14T22:31:12Z | 2019-01-04T19:07:06Z | null | ['CVE-2018-14721'] | Server-Side Request Forgery (SSRF) in jackson-databind | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14721'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://a... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-337x-4q8g-prc5 | 2023-09-05T18:43:33Z | 2019-01-14T16:20:05Z | null | ['CVE-2019-3498'] | Improper Input Validation in Django | In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in `django.views.defaults.page_not_found()`, leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted UR... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3498'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-337x-4q8g-prc5'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-ann... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:52Z', 'nvd_published_at': '2019-01-09T23:29:00Z'} |
1.4.0 | GHSA-645p-88qh-w398 | 2023-09-14T14:00:55Z | 2019-01-04T19:06:55Z | null | ['CVE-2018-14718'] | Arbitrary Code Execution in jackson-databind | FasterXML jackson-databind 2.x before 2.9.7, 2.8.11.3, 2.7.9.5, and 2.6.7.3 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-data... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14718'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://a... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:52Z', 'nvd_published_at': '2019-01-02T18:29:00Z'} |
1.4.0 | GHSA-mh24-7wvg-v88g | 2023-09-01T09:46:45Z | 2019-01-30T20:56:26Z | null | ['CVE-2019-6802'] | CRLF Injection in pypiserver | CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP headers and possibly conduct XSS attacks via a `%0d%0a` in a URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pypiserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6802'}, {'type': 'WEB', 'url': 'https://github.com/pypiserver/pypiserver/issues/237'}, {'type': 'WEB', 'url': 'https://github.com/pypiserver/pypiserver/commit/1375a67c55a9b8d4619df30d2a1c0b239d7357e6'}, {'type': 'ADVISORY', 'url': 'https://github.c... | {'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:14Z', 'nvd_published_at': '2019-01-25T04:29:00Z'} |
1.4.0 | GHSA-54mg-vgrp-mwx9 | 2021-08-04T15:01:30Z | 2019-05-14T04:01:37Z | null | ['CVE-2019-11808'] | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack | Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-session'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11808'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/issues/1448'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratp... | {'cwe_ids': ['CWE-338'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T03:48:09Z', 'nvd_published_at': '2019-05-07T07:29:00Z'} |
1.4.0 | GHSA-jgmr-wrwx-mgfj | 2021-08-03T21:46:37Z | 2019-05-14T04:02:35Z | null | ['CVE-2019-3797'] | Exposure of Sensitive Information to an Unauthorized Actor and SQL Injection in Spring Data JPA | This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ?startingWith?, ?endingWith? or ?containing? could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually def... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introd... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3797'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3797'}] | {'cwe_ids': ['CWE-200', 'CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-10T04:22:00Z', 'nvd_published_at': '2019-05-06T16:29:00Z'} |
1.4.0 | GHSA-wv67-9jq7-8r69 | 2021-08-03T21:47:43Z | 2019-05-14T04:02:45Z | null | ['CVE-2019-5432'] | Improper Input Validation and Buffer Over-read in mqtt-packet | A specifically malformed MQTT Subscribe packet crashes MQTT Brokers using the mqtt-packet module versions < 3.5.1, 4.0.0 - 4.1.3, 5.0.0 - 5.6.1, 6.0.0 - 6.1.2 for decoding. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5432'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/541354'}] | {'cwe_ids': ['CWE-125', 'CWE-126'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-10T04:24:12Z', 'nvd_published_at': '2019-05-06T17:29:00Z'} |
1.4.0 | GHSA-2xv3-h762-ccxv | 2020-08-31T18:31:05Z | 2019-05-29T19:18:02Z | null | [] | Out-of-bounds Read in concat-with-sourcemaps | Versions of `concat-with-sourcemaps` before 1.0.6 allocates uninitialized Buffers when a number is passed as a separator.
## Recommendation
Update to version 1.0.6 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'concat-with-sourcemaps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/320166'}, {'type': 'WEB', 'url': 'https://github.com/floridoo/concat-with-sourcemaps/blob/v1.0.5/index.js#L18'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/644'}] | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:17:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-37pw-qw47-4jxm | 2021-05-11T16:17:59Z | 2019-05-31T16:09:15Z | null | ['CVE-2018-8029'] | Privilege escalation vulnerability in Apache Hadoop | In Apache Hadoop versions 3.0.0-alpha1 to 3.1.0, 2.9.0 to 2.9.1, and 2.2.0 to 2.8.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'f... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8029'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0b8d58e02dbd0fb8bf7320c514fe58da1d6728bdc150f1ba04e0d9fc@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/17084c09e6dedf60efe08028b429... | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T16:08:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6qh5-wx38-q92g | 2020-08-31T18:22:04Z | 2019-05-30T17:15:59Z | null | [] | Directory Traversal in ltt.js | Affected versions of `ltt.js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../..... | [] | [{'package': {'ecosystem': 'npm', 'name': 'ltt.js'}, 'versions': ['1.0.0']}] | [{'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt.js'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/ltt.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/411'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:15:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-72fv-qgj6-2w2p | 2021-08-03T21:27:01Z | 2019-05-01T18:37:08Z | null | ['CVE-2015-9286'] | Cross-site Scripting in NodeBB | Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9286'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/pull/3371'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/compare/56b79a9...4de7529'}, {'type': 'WEB', 'url': 'https://vulners.com/securityvulns/SECURITYVULNS:DOC:32625'},... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-01T18:20:32Z', 'nvd_published_at': '2019-04-30T14:29:00Z'} |
1.4.0 | GHSA-g86p-hgx5-2pfh | 2022-03-04T21:16:27Z | 2019-05-29T18:48:11Z | null | ['CVE-2019-12300'] | Improper Authentication in Buildbot | Buildbot before 1.8.2 and 2.x before 2.3.1 accepts a user-submitted authorization token from OAuth and uses it to authenticate a user. If an attacker has a token allowing them to read the user details of a victim, they can login as the victim. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'buildbot'}, 'ecosystem_specific': {'affected_functions': ['buildbot.www.oauth2.OAuth2Auth.acceptToken']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'buildbot'}, 'ecosystem_specific': {'af... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12300'}, {'type': 'PACKAGE', 'url': 'https://github.com/buildbot/buildbot'}, {'type': 'WEB', 'url': 'https://github.com/buildbot/buildbot/wiki/OAuth-vulnerability-in-using-submitted-authorization-token-for-authentication'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:47:56Z', 'nvd_published_at': '2019-05-23T15:30:00Z'} |
1.4.0 | GHSA-8v67-x8q5-3x3g | 2021-08-04T14:53:05Z | 2019-05-14T04:01:27Z | null | ['CVE-2018-19048'] | Cross-Site Scripting in simditor | Versions of `simditor` prior to 2.3.22 are vulnerable to Cross-Site Scripting. The package does not sanitize user input that is rendered with `innerHTML`, allowing attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 2.3.22 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'simditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19048'}, {'type': 'WEB', 'url': 'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd'}, {'type': 'WEB', 'url': 'https://github.com/hkglue/simditor_demo.git'}, {'type': 'WEB', 'url': 'https://github.com/hkglue/simd... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T01:08:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5f7m-mmpc-qhh4 | 2022-08-03T20:30:06Z | 2019-05-23T09:27:00Z | null | [] | mysql Node.JS Module Vulnerable to Remote Memory Exposure | Versions of `mysql` before 2.14.0 are vulnerable to remove memory exposure.
Affected versions of `mysql` package allocate and send an uninitialized memory over the network when a number is provided as a password.
Only `mysql` running on Node.js versions below 6.0.0 are affected due to a throw added in newer node.js v... | [] | [{'package': {'ecosystem': 'npm', 'name': 'mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha8'}, {'fixed': '2.14.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mysqljs/mysql/commit/192fe45593ba5768534afb6f2154432ca67a5002'}, {'type': 'WEB', 'url': 'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52'}, {'type': 'PACKAGE', 'url': 'https://github.com/mysqljs/mysql'}, {'type': 'WEB', 'url': 'https://www.npm... | {'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-23T07:40:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7jfh-2xc9-ccv7 | 2020-08-31T18:29:45Z | 2019-05-31T23:46:40Z | null | [] | Cross-Site Scripting in public | All versions of `public` are vulnerable to stored cross-site scripting (XSS).
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time. | [] | [{'package': {'ecosystem': 'npm', 'name': 'public'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'public'}, 'versions': ['0.1.5']}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/316346'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/609'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:44:38Z', 'nvd_published_at': None} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.