schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringclasses 11
values | aliases stringlengths 2 20 | summary stringlengths 4 172 | details stringlengths 47 3.95k | severity stringlengths 2 79 | affected stringlengths 76 3.32k | references stringlengths 82 11.3k | database_specific stringlengths 131 190 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-j59f-6m4q-62h6 | 2021-08-04T21:17:50Z | 2019-05-30T17:28:48Z | null | [] | Improper Key Verification in ipns | Versions 0.1.1 or 0.1.2 of `ipns` are vulnerable to improper key validation. This is due to the public key verification was not being performed properly, resulting in any key being valid.
## Recommendation
Update to version 0.1.3 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/'}] | [{'package': {'ecosystem': 'npm', 'name': 'ipns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ipfs/js-ipns/commit/33684e356f1f2fdcd99b2fb85fcc5d52223769a0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/693'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:28:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p72p-rjr2-r439 | 2020-08-31T18:35:03Z | 2019-05-29T20:24:02Z | null | [] | Server-Side Request Forgery in terriajs-server | Versions of `terriajs-server`prior to 2.7.4 are vulnerable to Server-Side Request Forgery (SSRF). If an attacker has access to a server whitelisted by the terriajs-server proxy or if the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the attacker can use the terriajs-se... | [] | [{'package': {'ecosystem': 'npm', 'name': 'terriajs-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0'}, {'type': 'WEB', 'url': 'https://medium.com/terria/security-vulnerability-in-terriajs-server-82c8bf4da0a5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/768'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T20:23:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xrmp-99wj-p6jc | 2021-08-04T21:21:43Z | 2019-05-31T23:43:09Z | null | [] | Prototype Pollution in deap | Versions of `deap` before 1.0.1 are vulnerable to prototype pollution.
## Recommendation
Update to version 1.0.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'deap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/310446'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:deap:20180415'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/611'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:42:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cqcf-4g4h-rghf | 2021-05-11T16:14:58Z | 2019-05-14T04:00:31Z | null | ['CVE-2019-0213'] | Cross-site scripting in Apache Archiva | In Apache Archiva before 2.2.4, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0213'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3@%3Cusers.archiva.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922a... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-03T15:36:51Z', 'nvd_published_at': '2019-04-30T22:29:00Z'} |
1.4.0 | GHSA-42xw-2xvc-qx8m | 2021-07-27T20:36:18Z | 2019-05-29T18:04:45Z | null | ['CVE-2019-10742'] | Denial of Service in axios | Versions of `axios` prior to 0.18.1 are vulnerable to Denial of Service. If a request exceeds the `maxContentLength` property, the package prints an error but does not stop the request. This may cause high CPU usage and lead to Denial of Service.
## Recommendation
Upgrade to 0.18.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'axios'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.18.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10742'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/issues/1098'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/pull/1485'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/commit/acabfbdf00a58bb866c9d070e8a10d1d0dbeb57... | {'cwe_ids': ['CWE-20', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T15:22:47Z', 'nvd_published_at': '2019-05-07T19:29:00Z'} |
1.4.0 | GHSA-vmhw-fhj6-m3g5 | 2020-08-31T18:31:33Z | 2019-05-31T23:46:33Z | null | [] | Path Traversal in angular-http-server | Versions of `angular-http-server` before 1.4.4 are vulnerable to path traversal.
## Recommendation
Update to version 1.4.4 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'angular-http-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/simonh1000/angular-http-server/commit/8bafc9577161469f5dea01e0b98ea9c525d063e9'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/330349'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/656'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:44:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ww4x-rwq6-qpgf | 2023-08-29T14:15:24Z | 2019-05-29T19:11:31Z | null | ['CVE-2015-9284'] | OmniAuth Ruby gem Cross-site Request Forgery in request phase | The request phase of the OmniAuth Ruby gem (1.9.2 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9284'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/issues/1031'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth-rails/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/pull/809'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:10:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xf7w-r453-m56c | 2021-08-04T20:12:16Z | 2019-05-30T17:19:34Z | null | ['CVE-2019-13173'] | Arbitrary File Overwrite in fstream | Versions of `fstream` prior to 1.0.12 are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. The `fstream.DirWriter()` function is vul... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'fstream'}, 'ecosystem_specific': {'affected_functions': ['fstream.DirWriter']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13173'}, {'type': 'WEB', 'url': 'https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4123-1/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/886'}, {'type': 'W... | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:17:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jj6g-7j8p-7gf2 | 2020-08-31T18:29:43Z | 2019-05-30T21:03:24Z | null | [] | Cross-Site Scripting in bracket-template | All versions of `bracket-template` are vulnerable to stored cross-site scripting (XSS). This is exploitable when a variable passed in via a GET parameter is used in a template.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this t... | [] | [{'package': {'ecosystem': 'npm', 'name': 'bracket-template'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.5'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/317125'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/608'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T21:02:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h896-mx9x-g32g | 2022-11-17T17:55:41Z | 2019-05-29T18:15:50Z | null | ['CVE-2019-0188'] | XML External Entity injection in Apache Camel | Apache Camel prior to 2.24.0 contains an XML external entity injection (XXE) vulnerability (CWE-611) due to using an outdated vulnerable JSON-lib library. This affects only the camel-xmljson component, which was removed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.24.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-xmljson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0188'}, {'type': 'WEB', 'url': 'https://github.com/apache/camel/blob/master/docs/user-manual/en/security-advisories/CVE-2019-0188.txt.asc'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TAMAYA-410'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:15:06Z', 'nvd_published_at': '2019-05-28T19:29:00Z'} |
1.4.0 | GHSA-78j5-gcmf-vqc8 | 2021-10-06T22:02:18Z | 2019-05-29T18:02:59Z | null | ['CVE-2019-14772'] | Cross-Site Scripting (XSS) in Verdaccio | ### Impact
What kind of vulnerability is it? Who is impacted?
Cross-Site Scripting XSS, malicious packages with content Javascript that might be executed in the User Interface stealing user credentials.
### Patches
Has the problem been patched? What versions should users upgrade to?
Users that still using `v3` must... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'verdaccio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/verdaccio/verdaccio/security/advisories/GHSA-78j5-gcmf-vqc8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14772'}, {'type': 'PACKAGE', 'url': 'https://github.com/verdaccio/verdaccio'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/832'},... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-28T21:00:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6qqf-vvcr-7qrv | 2020-08-31T18:34:48Z | 2019-05-23T09:27:22Z | null | [] | Cryptographically Weak PRNG in generate-password | Affected versions of generate-password generate random values that are biased towards certain characters depending on the chosen character sets. This may result in guessable passwords.
## Recommendation
Update to version 1.4.1 or later.
| [] | [{'package': {'ecosystem': 'npm', 'name': 'generate-password'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/brendanashworth/generate-password/pull/26'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/762'}] | {'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-23T07:38:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-36m4-6v6m-4vpr | 2023-09-08T19:21:19Z | 2019-05-29T18:04:55Z | null | ['CVE-2019-12043'] | Cross-site Scripting in remarkable | In remarkable 1.7.1, lib/parser_inline.js mishandles URL filtering, which allows attackers to trigger XSS via unprintable characters, as demonstrated by a `\x0ejavascript:` URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'remarkable'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12043'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/issues/332'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/commit/49e87b7ae2dc323d83606792a749fb207595249e'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T01:14:15Z', 'nvd_published_at': '2019-05-13T14:29:00Z'} |
1.4.0 | GHSA-2hw2-62cp-p9p7 | 2021-07-27T20:54:44Z | 2019-05-29T18:54:11Z | null | ['CVE-2019-0201'] | Access control bypass in Apache ZooKeeper | An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper?s getACL() command doesn?t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id fiel... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zookeeper:zookeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.4.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.zookeeper:zookeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0201'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4352'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:53:55Z', 'nvd_published_at': '2019-05-23T14:29:00Z'} |
1.4.0 | GHSA-27v7-qhfv-rqq8 | 2021-08-31T20:56:47Z | 2019-05-30T17:26:30Z | null | [] | Insecure Credential Storage in web3 | All versions of `web3` are vulnerable to Insecure Credential Storage. The package stores encrypted wallets in local storage and requires a password to load the wallet. Once the wallet is loaded, the private key is accessible via LocalStorage. Exploiting this vulnerability likely requires a Cross-Site Scripting vulnerab... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'web3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ethereum/web3.js/issues/2739'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/web3.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WEB3-174533'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/877'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:25:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qr32-j4j6-3m7r | 2020-08-31T18:20:27Z | 2019-05-29T20:23:00Z | null | ['CVE-2017-16087'] | Command Injection in fs-git | Affected versions of `fs-git` do not sanitize strings passed into the `buildCommand` method, resulting in arbitrary code execution.
## Recommendation
Update to version 1.0.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'fs-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16087'}, {'type': 'WEB', 'url': 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998'}, {'type': 'WEB', 'url': 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998#diff-13b5b151431c7e7a17f... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T20:22:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f554-x222-wgf7 | 2021-08-04T15:07:00Z | 2019-05-29T18:05:03Z | null | ['CVE-2013-7285'] | Command Injection in Xstream | Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7285'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607a... | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-05-15T23:13:58Z', 'nvd_published_at': '2019-05-15T17:29:00Z'} |
1.4.0 | GHSA-g99m-3m46-4gm9 | 2021-08-03T21:31:13Z | 2019-05-14T04:00:47Z | null | ['CVE-2018-17202'] | Infinite Loop in Apache Sanselan | Certain input files could make the code to enter into an infinite loop when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sanselan:sanselan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.97-incubator'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17202'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/69204376d12205b0d2d90e6fcbeebb99b894e6db88c8ff565c4e1efa@%3Cdev.commons.apache.org%3E'}] | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-09T15:07:18Z', 'nvd_published_at': '2019-05-06T18:29:00Z'} |
1.4.0 | GHSA-jxgm-9f58-w4xp | 2021-07-27T20:35:40Z | 2019-05-14T04:00:21Z | null | ['CVE-2019-0214'] | Improper Input Validation in Apache Archiva | In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0214'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af45... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-03T15:33:48Z', 'nvd_published_at': '2019-04-30T22:29:00Z'} |
1.4.0 | GHSA-4wjq-69rc-8wcp | 2022-11-17T17:45:21Z | 2019-05-02T15:21:34Z | null | ['CVE-2019-0194'] | Path Traversal in Apache Camel | Apache Camel's File is vulnerable to directory traversal. Camel 2.21.0 to 2.21.3, 2.22.0 to 2.22.2, 2.23.0 and the unsupported Camel 2.x (2.19 and earlier) versions may be also affected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.21.0'}, {'fixed': '2.21.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.21.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0194'}, {'type': 'WEB', 'url': 'https://github.com/apache/camel/pull/2700'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-13042'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-02T15:00:07Z', 'nvd_published_at': '2019-04-30T22:29:00Z'} |
1.4.0 | GHSA-87mg-h5r3-hw88 | 2021-09-16T21:01:13Z | 2019-05-30T17:23:28Z | null | [] | Cross-Site Scripting in bootbox | All version of `bootbox` are vulnerable to Cross-Site Scripting. The package does not sanitize user input in the provided dialog boxes, allowing attackers to inject HTML code and execute arbitrary JavaScript.
## Recommendation
Sanitize user input being passed to `bootbox` or consider using an alternative package. | [] | [{'package': {'ecosystem': 'npm', 'name': 'bootbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.5.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/makeusabrew/bootbox/issues/661'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/508446'}, {'type': 'PACKAGE', 'url': 'https://github.com/makeusabrew/bootbox'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/882'}] | {'cwe_ids': ['CWE-64', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:22:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5ww9-j83m-q7qx | 2023-09-13T16:21:31Z | 2019-05-23T09:32:24Z | null | ['CVE-2019-12086'] | Information exposure in FasterXML jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a cra... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12086'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2326'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2935'}, {'ty... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-22T04:34:56Z', 'nvd_published_at': '2019-05-17T17:29:00Z'} |
1.4.0 | GHSA-h9gj-rqrw-x4fq | 2021-06-15T17:07:00Z | 2019-05-14T04:02:24Z | null | ['CVE-2019-0227'] | Server Side Request Forgery in Apache Axis | A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.axis:axis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0227'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd@%3Cjava-user.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8b... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-03T15:21:34Z', 'nvd_published_at': '2019-05-01T21:29:00Z'} |
1.4.0 | GHSA-j44m-qm6p-hp7m | 2021-08-03T21:28:27Z | 2019-05-01T18:37:31Z | null | ['CVE-2018-20834'] | Arbitrary File Overwrite in tar | Versions of `tar` prior to 4.4.2 for 4.x and 2.2.2 for 2.x are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file.
## Recommendation... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Extract']}, 'ra... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20834'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-01T18:35:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xm28-fw2x-fqv2 | 2021-08-04T21:19:17Z | 2019-05-31T23:08:14Z | null | [] | Denial of Service in foreman | All versions of `foreman` are vulnerable to Regular Expression Denial of Service when requests to it are made with a specially crafted path.
## Recommendation
Upgrade to version 3.0.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'foreman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/320586'}, {'type': 'WEB', 'url': 'https://github.com/strongloop/node-foreman/blob/v2.0.0/forward.js#L30'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:foreman:20180429'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/645'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:07:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4x49-w62v-76q7 | 2021-08-03T21:40:51Z | 2019-05-23T08:39:23Z | null | ['CVE-2019-3799'] | Path Traversal in Spring Cloud Config | Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a speciall... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-config-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-config-server'}, 'ranges': [{'type': 'ECOSYSTEM... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3799'}, {'type': 'WEB', 'url': 'https://github.com/mpgn/CVE-2019-3799'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3799'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-10T04:20:45Z', 'nvd_published_at': '2019-05-06T16:29:00Z'} |
1.4.0 | GHSA-j4mr-9xw3-c9jx | 2020-08-31T18:31:43Z | 2019-05-31T23:47:01Z | null | [] | Out-of-bounds Read in base64-url | Versions of `base64-url` before 2.0.0 are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input.
## Recommendation
Update to version 2.0.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'base64-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/321692'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/660'}] | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:45:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jjpq-gp5q-8q6w | 2021-06-15T17:08:11Z | 2019-05-30T03:30:42Z | null | ['CVE-2019-0221'] | Cross-site scripting in Apache Tomcat | The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'i... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0221'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3929'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3931'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3c... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T03:30:07Z', 'nvd_published_at': '2019-05-28T22:29:00Z'} |
1.4.0 | GHSA-pgr8-jg6h-8gw6 | 2021-08-04T15:26:36Z | 2019-05-23T09:26:20Z | null | [] | Cross-Site Scripting in webpack-bundle-analyzer | Versions of `webpack-bundle-analyzer` prior to 3.3.2 are vulnerable to Cross-Site Scripting. The package uses `JSON.stringify()` without properly escaping input which may lead to Cross-Site Scripting.
## Recommendation
Upgrade to version 3.3.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'webpack-bundle-analyzer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263'}, {'type': 'WEB', 'url': 'https://github.com/webpack-contrib/webpack-bundle-analyzer/pull/264'}, {'type': 'WEB', 'url': 'https://github.com/webpack-contrib/webpack-bundle-analyzer/commit/20f2b4c553ee343f491faf63e39427fba9908... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-23T07:34:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x2mc-8fgj-3wmr | 2021-08-03T21:27:51Z | 2019-05-01T18:37:18Z | null | ['CVE-2018-20835'] | Improper Input Validation in tar-fs | A vulnerability was found in tar-fs before 1.16.2. An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'tar-fs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20835'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/344595'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/tar-fs/comp... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-01T18:25:25Z', 'nvd_published_at': '2019-04-30T19:29:00Z'} |
1.4.0 | GHSA-gh4g-3gm9-5wrq | 2021-08-04T16:06:35Z | 2019-05-29T18:38:08Z | null | ['CVE-2019-12313'] | Cross-Site Scripting in shave | Versions of `shave` prior to 2.5.3 are vulnerable to Cross-Site Scripting. The `shave` package overwrites HTML elements and in doing so fails to properly encode the output. If encoded HTML input is passed into `shave` the output will be decoded which may lead to Cross-Site Scripting.
## Recommendation
Upgrade to ver... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'shave'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12313'}, {'type': 'WEB', 'url': 'https://github.com/dollarshaveclub/shave/commit/da7371b0531ba14eae48ef1bb1456a3de4cfa954#diff-074799b511e4b61923dfd3f2a3bf9b54R67'}, {'type': 'WEB', 'url': 'https://github.com/dollarshaveclub/shave/compare/852b537..... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:37:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rjx9-2936-9ffx | 2021-08-03T22:54:50Z | 2019-05-14T04:01:06Z | null | ['CVE-2018-17201'] | Improper Input Validation in Apache Sanselan | Certain input files could make the code hang when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sanselan:sanselan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.97-incubator'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17201'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cd37861963aa6d2694c8947d464c99614d3e1a9db6c1a2a8b7b5840a@%3Cdev.commons.apache.org%3E'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-09T15:10:25Z', 'nvd_published_at': '2019-05-06T18:29:00Z'} |
1.4.0 | GHSA-vm59-329q-p468 | 2021-08-03T21:30:31Z | 2019-05-14T04:00:37Z | null | ['CVE-2018-8035'] | Cross-site Scripting in Apache UIMA | This vulnerability relates to the user's browser processing of DUCC webpage input data.The javascript comprising Apache UIMA DUCC (<= 2.2.2) which runs in the user's browser does not sufficiently filter user supplied inputs, which may result in unintended execution of user supplied javascript code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.uima:uima-ducc-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8035'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2f49681259b375d53431605f1c557ef8a3ed0af01a488d2e1b330053@%3Cdev.uima.apache.org%3E'}, {'type': 'WEB', 'url': 'https://uima.apache.org/security_report'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-03T15:42:34Z', 'nvd_published_at': '2019-05-01T21:29:00Z'} |
1.4.0 | GHSA-23gj-368h-92pq | 2021-08-04T15:17:12Z | 2019-05-29T18:05:11Z | null | ['CVE-2019-11082'] | Path Traversal in DKPro Core | core/api/datasets/internal/actions/Explode.java in the Dataset API in DKPro Core through 1.10.0 allows Directory Traversal, resulting in the overwrite of local files with the contents of an archive. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'de.tudarmstadt.ukp.dkpro.core:de.tudarmstadt.ukp.dkpro.core.api.datasets-asl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11082'}, {'type': 'WEB', 'url': 'https://github.com/dkpro/dkpro-core/issues/1325'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-16T15:34:40Z', 'nvd_published_at': '2019-05-10T16:29:00Z'} |
1.4.0 | GHSA-2hwp-g4g7-mwwj | 2020-08-31T18:35:05Z | 2019-05-29T20:25:35Z | null | [] | Reflected Cross-Site Scripting in jquery.terminal | Versions of `jquery.terminal` prior to 1.21.0 are vulnerable to Reflected Cross-Site Scripting. If the application has either of the options `anyLinks` or `invokeMethods` set to true, the application may execute arbitrary JavaScript through crafted malicious payloads due to insufficient sanitization.
## Recommendatio... | [] | [{'package': {'ecosystem': 'npm', 'name': 'jquery.terminal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jcubic/jquery.terminal/commit/c8b7727d21960031b62a4ef1ed52f3c634046211'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/769'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T20:24:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8xqr-4cpm-wx7g | 2020-08-31T18:31:14Z | 2019-05-31T23:47:27Z | null | [] | Cross-Site Scripting in react-svg | Versions of `react-svg` before 2.2.18 are vulnerable to cross-site scripting (xss). This is due to the fact that scripts found in SVG files are run by default.
## Recommendation
Update to version 2.2.18 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'react-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.18'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tanem/react-svg/pull/57'}, {'type': 'WEB', 'url': 'https://github.com/tanem/react-svg/pull/57/commits/ec7de5d678f53a085cee1348cb1aa069c9fc42fb'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/648'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:44:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g996-q5r8-w7g2 | 2023-09-21T18:22:10Z | 2019-11-12T23:00:53Z | null | ['CVE-2019-10909'] | Symfony Cross-site Scripting (XSS) vulnerability | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, validation messages are not escaped, which can lead to XSS when user input is included. This is related to symfony/framework-bundle. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10909'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.y... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T16:48:32Z', 'nvd_published_at': '2019-05-16T22:29:00Z'} |
1.4.0 | GHSA-cff7-6h4q-q5pj | 2023-08-25T23:33:30Z | 2019-11-14T15:25:51Z | null | ['CVE-2019-18848'] | JSON-jwt Gem lacked element count during splitting of JWE string | The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'json-jwt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18848'}, {'type': 'WEB', 'url': 'https://github.com/nov/json-jwt/commit/ada16e772906efdd035e3df49cb2ae372f0f948a'}, {'type': 'PACKAGE', 'url': 'https://github.com/nov/json-jwt'}, {'type': 'WEB', 'url': 'https://github.com/nov/json-jwt/compare/v1.10... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-14T15:24:51Z', 'nvd_published_at': '2019-11-12T15:15:00Z'} |
1.4.0 | GHSA-fm68-89m8-4gjj | 2023-09-06T13:49:44Z | 2019-11-12T22:59:47Z | null | ['CVE-2019-8233'] | Composer JavaScript injection possible via html comments | In Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1, an unauthenticated user can inject arbitrary JavaScript code as a result of the sanitization engine ignoring HTML comments. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8233'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:12:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-425c-ccf3-3jrr | 2021-01-08T19:57:59Z | 2019-11-15T23:10:35Z | null | ['CVE-2019-16762'] | Critical severity vulnerability that affects slpjs | ## Validator parsing discrepancy due to string encoding
### Impact
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'slpjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-425c-ccf3-3jrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16762'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-68wg-qv6r-j4vp | 2021-08-18T22:44:59Z | 2019-11-20T17:44:54Z | null | ['CVE-2019-10766'] | SQL Injection in usmanhalalit/pixie | Pixie versions 1.0.x before 1.0.3, and 2.0.x before 2.0.2 allow SQL Injection in the limit() function due to improper sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'usmanhalalit/pixie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'usmanhalalit/pixie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10766'}, {'type': 'WEB', 'url': 'https://github.com/usmanhalalit/pixie/commit/9bd991021abbcbfb19347a07dca8b7e518b8abc9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-USMANHALALITPIXIE-534879'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-20T17:42:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pf8f-w267-mq2h | 2023-01-23T20:22:08Z | 2019-11-15T20:26:59Z | null | ['CVE-2019-18978'] | The rack-cors rubygem may allow directory traveral | An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack-cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18978'}, {'type': 'WEB', 'url': 'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d'}, {'type': 'PACKAGE', 'url': 'https://github.com/cyu/rack-cors'}, {'type': 'WEB', 'url': 'https://github.com/cyu/rack-cors/compare/v1... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-15T20:26:35Z', 'nvd_published_at': '2019-11-14T21:15:00Z'} |
1.4.0 | GHSA-cj8p-53v9-2c26 | 2023-09-11T14:59:52Z | 2019-11-08T15:28:11Z | null | ['CVE-2019-15485'] | Cross-site Scripting in Bolt | Bolt before 3.6.10 has XSS via createFolder or createFile in `Controller/Async/FilesystemManager.php`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bolt/bolt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15485'}, {'type': 'WEB', 'url': 'https://github.com/bolt/bolt/pull/7800'}, {'type': 'WEB', 'url': 'https://github.com/bolt/bolt/releases/tag/v3.6.10'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-10-01T18:00:46Z', 'nvd_published_at': '2019-08-23T13:15:00Z'} |
1.4.0 | GHSA-89px-ww3j-g2mm | 2021-01-08T21:28:08Z | 2019-11-29T17:05:59Z | null | ['CVE-2019-16766'] | 2FA bypass in Wagtail through new device path | ## 2FA bypass through new device path
### Impact
If someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS.
### Patches
This problem has been patched in version 1.3.0.
### Work... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'wagtail-2fa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/labd/wagtail-2fa/security/advisories/GHSA-89px-ww3j-g2mm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16766'}, {'type': 'WEB', 'url': 'https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-290', 'CWE-304'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j9xp-92vc-559j | 2021-08-18T22:09:33Z | 2019-11-06T17:11:10Z | null | ['CVE-2019-10748'] | SQL Injection in sequelize | Affected versions of `sequelize` are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the MariaDB and MySQL dialects, which may allow attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
If you are using `sequelize` 5.x, upgrade to version 5.8.11 or lat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.35.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.44.3'}]}]}, {'package': {'ecosystem':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10748'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/11089,'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/a72a3f5,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450221'}, {'type... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-05T19:59:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-852q-xxj4-x2rx | 2021-08-17T22:41:38Z | 2019-11-08T20:05:45Z | null | ['CVE-2019-15537'] | SQL Injection in SimpleSAMLphp | The proxystatistics module before 3.1.0 for SimpleSAMLphp allows SQL Injection in lib/Auth/Process/DatabaseCommand.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'cesnet/simplesamlphp-module-proxystatistics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15537'}, {'type': 'WEB', 'url': 'https://github.com/CESNET/proxystatistics-simplesamlphp-module/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/CESNET/proxystatistics-simplesamlphp-module/releases/tag/v3.1.0'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T12:51:13Z', 'nvd_published_at': '2019-08-23T18:15:00Z'} |
1.4.0 | GHSA-9xr8-8hmc-389f | 2021-08-18T22:47:15Z | 2019-11-22T13:45:33Z | null | [] | Cross-Site Scripting in vant | Versions of `vant` prior to 2.1.8 are vulnerable to Cross-Site Scripting. The text value of the `Picker` component column is not sanitized, which may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 2.1.8 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'vant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/youzan/vant/issues/4270'}, {'type': 'WEB', 'url': 'https://github.com/youzan/vant/pull/4278/commits/d777b78c7dc2c904f474d057ea88449cfe2ca13a'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VANT-460461'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1157'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-21T04:18:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m52x-29pq-w3vv | 2022-08-03T13:00:22Z | 2019-11-22T18:18:03Z | null | ['CVE-2019-16763'] | Pannellum Cross-Site Scripting due to data not being sanitized for URIs or vbscript | Versions of `pannellum` prior to 2.5.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs for data URIs, which may allow attackers to execute arbitrary code in a victim's browser.
## Recommendation
Upgrade to version 2.5.6 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'pannellum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16763'}, {'type': 'WEB', 'url': 'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914'}, {'type': 'ADVISORY', ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4j6x-w426-6rc6 | 2020-06-16T20:58:26Z | 2019-11-08T17:31:17Z | null | [] | Default Express middleware security check is ignored in production | ## Default Express middleware security check is ignored in production
### Impact
All Cube.js deployments that use affected versions of `@cubejs-backend/api-gateway` with default express authentication middleware in production environment are affected.
### Patches
@cubejs-backend/api-gateway@0.11.17
### Workarounds
O... | [] | [{'package': {'ecosystem': 'npm', 'name': '@cubejs-backend/api-gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.11.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.11.16'}}] | [{'type': 'WEB', 'url': 'https://github.com/cube-js/cube.js/security/advisories/GHSA-4j6x-w426-6rc6'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4j6x-w426-6rc6'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cg8j-8w52-735v | 2021-12-03T14:39:16Z | 2019-11-12T23:01:25Z | null | ['CVE-2019-12204'] | Missing warning can lead to unauthenticated admin access in SilverStripe | In SilverStripe through 4.3.3, a missing warning about leaving install.php in a public webroot can lead to unauthenticated admin access. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12204'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/silverstripe/cms'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/silverstripe/framework'}, {'type': 'WEB'... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-10-01T18:05:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pwrf-q7h8-jjr7 | 2021-05-10T17:22:09Z | 2019-11-08T20:06:24Z | null | ['CVE-2019-16403'] | Authorization Bypass Through User-Controlled Key in Bagisto | In Webkul Bagisto before 0.1.5, the functionalities for customers to change their own values (such as address, review, orders, etc.) can also be manipulated by other customers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bagisto/bagisto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16403'}, {'type': 'WEB', 'url': 'https://github.com/bagisto/bagisto/issues/749'}] | {'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T12:47:46Z', 'nvd_published_at': '2019-09-18T12:15:00Z'} |
1.4.0 | GHSA-hx83-rpqf-m267 | 2021-08-18T22:42:32Z | 2019-11-20T01:38:00Z | null | ['CVE-2018-11768'] | user/group information can be corrupted across storing in fsimage and reading back from fsimage | In Apache Hadoop 3.1.0 to 3.1.1, 3.0.0-alpha1 to 3.0.3, 2.9.0 to 2.9.1, and 2.0.0-alpha to 2.8.4, the user/group information can be corrupted across storing in fsimage and reading back from fsimage. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.8.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'f... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11768'}, {'type': 'WEB', 'url': 'https://hadoop.apache.org/cve_list.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2067a797b330530a6932f4b08f703b3173253d0a2b7c8c524e54adaf@%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:28:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fxp8-7h5w-h235 | 2021-08-18T22:27:14Z | 2019-11-12T22:58:11Z | null | ['CVE-2019-13234'] | XSS in search engine | In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the search engine. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13234'}, {'type': 'WEB', 'url': 'https://aetsu.github.io/OpenCms'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:29:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6r58-4xgr-gm6m | 2023-09-20T09:57:17Z | 2019-11-12T23:01:59Z | null | ['CVE-2019-12617'] | SilverStripe Priviledge escalation through cache pollution | In SilverStripe through 4.3.3, there is access escalation for CMS users with limited access through permission cache pollution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'af... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12617'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/blog/tag/release'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:50:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mr6r-82x4-f4jj | 2021-08-18T22:40:49Z | 2019-11-20T01:34:50Z | null | ['CVE-2019-10764'] | Timing attacks might allow practical recovery of the long-term private key | In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'simplito/elliptic-php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764'}, {'type': 'WEB', 'url': 'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'}, {'type': 'WEB', 'url': 'https://minerva.crocs.fi.muni.cz/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-SIMPLITO... | {'cwe_ids': ['CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:07:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vrcf-g539-x6h3 | 2022-03-23T20:24:50Z | 2019-11-20T01:37:13Z | null | ['CVE-2019-17206'] | Uncontrolled deserialization of a pickled object in rediswrapper allows attackers to execute arbitrary scripts | Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rediswrapper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17206'}, {'type': 'WEB', 'url': 'https://github.com/frostming/rediswrapper/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/frostming/rediswrapper/commit/748f60bafd857c24f65683426f665350e2c3f91b'}, {'type': 'PACKAGE', 'url': 'https://github.com... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:20:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5whq-j5qg-wjvp | 2021-08-18T22:33:30Z | 2019-11-18T17:16:06Z | null | ['CVE-2019-12562'] | Stored Cross-Site Scripting vulnerability in admin component of DotNetNuke | Cross-site scripting (XSS) is possible in DNN (formerly DotNetNuke) before 9.4.0 by remote authenticated users via the Display Name field in the admin notification function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12562'}, {'type': 'WEB', 'url': 'https://mayaseven.com/cve-2019-12562-stored-cross-site-scripting-in-dotnetnuke-dnn-version-v9-3-2/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154673/DotNetNuke-Cross-Site-Scripting.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-18T14:39:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rc75-cf5c-mxvh | 2021-08-18T22:08:17Z | 2019-11-06T17:06:28Z | null | ['CVE-2019-10755'] | Use of Cryptographically Weak Pseudo-Random Number Generator in org.pac4j:pac4j-saml | The SAML identifier generated within SAML2Utils.java was found to make use of the apache commons-lang3 RandomStringUtils class which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong. This issue only affects the 3.X release of pac4j-saml. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.pac4j:pac4j-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10755'}, {'type': 'WEB', 'url': 'https://github.com/pac4j/pac4j/commit/34d5b1028a2db201ee81ec51b52a782fe073f609'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGPAC4J-467407'}] | {'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-05T19:56:04Z', 'nvd_published_at': '2019-09-23T23:15:00Z'} |
1.4.0 | GHSA-9ggp-4jpr-7ppj | 2021-02-17T19:47:06Z | 2019-11-20T01:35:53Z | 2021-02-17T19:44:50Z | [] | Possible remote code execution via a remote procedure call | Withdrawn: duplicate of GHSA-pj4g-4488-wmxm
## Original Description
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'rpyc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16328'}, {'type': 'WEB', 'url': 'https://github.com/tomerfiliba/rpyc'}, {'type': 'WEB', 'url': 'https://rpyc.readthedocs.io/en/latest/docs/security.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg0004... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:15:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-89ch-hqf9-rgp3 | 2019-11-15T20:11:29Z | 2019-11-12T22:59:28Z | null | ['CVE-2019-8121'] | Using JS libraries with known security vulnerabilities | An insecure component vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. Magento 2 codebase leveraged outdated versions of JS libraries (Bootstrap, jquery, Knockout) with known security vulnerabilities. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8121'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8121.yaml'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-u... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:13:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xcrg-29h7-h4cj | 2022-04-19T20:14:24Z | 2019-11-20T01:38:52Z | null | ['CVE-2018-19277'] | XXE in PHPSpreadsheet due to encoding issue | securityScan() in PHPOffice PhpSpreadsheet through 1.5.0 allows a bypass of protection mechanisms for XXE via UTF-7 encoding in a .xlsx file | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpoffice/phpspreadsheet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19277'}, {'type': 'WEB', 'url': 'https://github.com/MewesK/TwigSpreadsheetBundle/issues/18'}, {'type': 'WEB', 'url': 'https://github.com/PHPOffice/PhpSpreadsheet/issues/771'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPOffice/PhpSpreadsheet'... | {'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:40:52Z', 'nvd_published_at': '2018-11-14T11:29:00Z'} |
1.4.0 | GHSA-2598-2f59-rmhq | 2021-08-18T22:10:20Z | 2019-11-08T17:05:17Z | null | ['CVE-2019-10749'] | SQL Injection in sequelize | Versions of `sequelize` prior to 3.35.1 are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the Postgres dialect, which may allow attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
Upgrade to version 3.35.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.35.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10749'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/adviso... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-07T23:29:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wmx6-vxcf-c3gr | 2021-01-08T20:11:31Z | 2019-11-15T23:10:19Z | null | ['CVE-2019-16761'] | Validation Bypass in slp-validate | Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus.
## Recommendation
Upgrade... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'slp-validate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}] | [{'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-wmx6-vxcf-c3gr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16761'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe586... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:49:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h7qw-mxrm-c6h2 | 2021-08-18T22:35:44Z | 2019-11-20T01:33:05Z | null | ['CVE-2016-6485'] | Unauthenticated crypto and weak IV in Magento\Framework\Encryption | The __construct function in Framework/Encryption/Crypt.php in Magento 2 uses the PHP rand function to generate a random number for the initialization vector, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by guessing the value. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6485'}, {'type': 'WEB', 'url': 'https://github.com/magento/magento2/pull/15017'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2016-6485.yaml'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T01:07:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7qqr-3pj3-q2f5 | 2021-08-18T22:25:15Z | 2019-11-12T22:58:21Z | null | ['CVE-2019-13236'] | XSS issues in the management interface | In system/workplace/ in Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple Reflected and Stored XSS issues in the management interface. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13236'}, {'type': 'WEB', 'url': 'https://aetsu.github.io/OpenCms'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'}, {'type': 'WEB', 'url': 'https://twitter.com/aetsu/status/1152096227938459648'}, {'type': 'W... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:28:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pgwj-prpq-jpc2 | 2023-09-21T18:19:26Z | 2019-11-18T17:27:31Z | null | ['CVE-2019-10910'] | Symfony Service IDs Allow Injection | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, when service ids allow user input, this could allow for SQL Injection and remote code execution. This is related to symfony/dependency-injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/dependency-injection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/dependency-injection'}, 'ecosystem_sp... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10910'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/d2fb5893923292a1da7985f0b56960b5bb10737b'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/dependency-injection/CVE-2019-109... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-18T14:06:00Z', 'nvd_published_at': '2019-05-16T22:29:00Z'} |
1.4.0 | GHSA-3q5x-7mxp-rp6j | 2021-08-18T22:23:57Z | 2019-11-12T22:59:32Z | null | ['CVE-2019-8135'] | Remote code execution via vulnerable Symphony dependecy injection | A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. Dependency injection through Symphony framework allows service identifiers to be derived from user controlled data, which can lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8135'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8135.yaml'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-u... | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:13:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cw6w-q88j-6mqf | 2021-06-15T17:21:24Z | 2019-11-08T17:12:59Z | null | ['CVE-2019-12419'] | Potential session hijack in Apache CXF | Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12419'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r861eb1a9e0250e9150215b17f0... | {'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-07T23:18:50Z', 'nvd_published_at': '2019-11-06T21:15:00Z'} |
1.4.0 | GHSA-89r3-rcpj-h7w6 | 2023-03-06T20:46:38Z | 2019-11-18T17:19:03Z | null | ['CVE-2019-0207'] | Path traversal attack on Windows platforms | Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0207'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/765be3606d865de513f6df9288842c3cf58b09a987c617a535f2b99d@%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-18T14:18:47Z', 'nvd_published_at': '2019-09-16T17:15:00Z'} |
1.4.0 | GHSA-36hf-6hp2-9g4c | 2022-04-19T20:07:03Z | 2019-11-12T22:58:14Z | null | ['CVE-2019-13237'] | Local file inclusion allows unauthorized access to internal resources in Alkacon OpenCms | In Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple resources vulnerable to Local File Inclusion that allow an attacker to access server resources: clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13237'}, {'type': 'WEB', 'url': 'https://aetsu.github.io/OpenCms'}, {'type': 'PACKAGE', 'url': 'https://github.com/alkacon/opencms-core'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-200', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:29:08Z', 'nvd_published_at': '2019-08-27T12:15:00Z'} |
1.4.0 | GHSA-gjmw-vf9h-g25v | 2023-09-14T14:55:23Z | 2019-11-13T00:32:38Z | null | ['CVE-2019-17531'] | jackson-databind polymorphic typing issue | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 prior to 2.9.10.1, 2.8.11.5, and 2.6.7.3. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-d... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17531'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2498'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/b5a304a98590b6bb766134f9261e6566dcbbb6d0'}, {'type': 'WEB', 'url': 'https://a... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-13T00:30:58Z', 'nvd_published_at': '2019-10-12T21:15:00Z'} |
1.4.0 | GHSA-m553-9wmx-533h | 2022-11-17T20:00:22Z | 2019-11-08T20:05:31Z | null | ['CVE-2019-16197'] | Cross-site scripting in Dolibarr | In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16197'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/file... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T13:02:38Z', 'nvd_published_at': '2019-09-16T13:15:00Z'} |
1.4.0 | GHSA-6g88-vr3v-76mf | 2021-08-18T22:35:10Z | 2019-11-20T01:31:31Z | null | ['CVE-2019-19010'] | Eval injection in Supybot/Limnoria | Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'limnoria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2019.11.09'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19010'}, {'type': 'WEB', 'url': 'https://github.com/ProgVal/Limnoria/commit/3848ae78de45b35c029cc333963d436b9d2f0a35'}, {'type': 'WEB', 'url': 'https://github.com/ProgVal/Limnoria/wiki/math-eval-vulnerability'}, {'type': 'WEB', 'url': 'https://list... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-18T18:01:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-89mq-4x47-5v83 | 2022-01-04T19:51:20Z | 2019-11-20T15:29:43Z | null | ['CVE-2019-10768'] | Prototype Pollution in angular | Versions of `angular ` prior to 1.7.9 are vulnerable to prototype pollution. The deprecated API function `merge()` does not restrict the modification of an Object's prototype in the , which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
Upgrade to vers... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10768'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/pull/16913'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/commit/add78e62004e80bb1e16ab2dfe224afa8e513bc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ang... | {'cwe_ids': ['CWE-1321', 'CWE-20', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-20T00:51:05Z', 'nvd_published_at': '2019-11-19T21:15:00Z'} |
1.4.0 | GHSA-427g-2r83-3ccm | 2021-07-28T15:37:48Z | 2019-11-12T22:59:24Z | null | ['CVE-2019-8126'] | Information disclosure through processing of external XML entities | An XML entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can craft document type definition for an XML representing XML layout. The crafted document type definition and XML layout allow processing of external entities which can lead... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8126'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:13:59Z', 'nvd_published_at': '2019-11-05T23:15:00Z'} |
1.4.0 | GHSA-jqwc-jm56-wcwj | 2021-05-11T16:19:11Z | 2019-11-08T17:07:42Z | null | ['CVE-2018-21030'] | Cross-site scripting in Jupyter Notebook | Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21030'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/pull/3341'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/releases/tag/5.5.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg0003... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-07T23:25:31Z', 'nvd_published_at': '2019-10-31T15:15:00Z'} |
1.4.0 | GHSA-2p6p-v69p-9mm9 | 2021-08-18T22:26:42Z | 2019-11-12T22:58:16Z | null | ['CVE-2019-13235'] | XSS in login form | In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13235'}, {'type': 'WEB', 'url': 'https://aetsu.github.io/OpenCms'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:28:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xm6j-x342-gwq9 | 2021-07-27T22:02:46Z | 2019-11-12T23:01:05Z | null | ['CVE-2019-16409'] | Unpublished files are exposed publicly | In the Versioned Files module through 2.0.3 for SilverStripe 3.x, unpublished versions of files are publicly exposed to anyone who can guess their URL. This guess could be highly informed by a basic understanding of the symbiote/silverstripe-versionedfiles source code. (Users who upgrade from SilverStripe 3.x to 4.x an... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-versionedfiles'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16409'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework'}, {'type': 'WEB', 'url': 'https://github.com/symbiote/silverstripe-versionedfiles'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-rel... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:54:36Z', 'nvd_published_at': '2019-09-26T16:15:00Z'} |
1.4.0 | GHSA-jvx5-rm6q-gx7p | 2021-08-18T22:29:09Z | 2019-11-12T23:01:50Z | null | ['CVE-2019-12245'] | Lack of access control on upoaded files | SilverStripe through 4.3.3 has incorrect access control for protected files uploaded via Upload::loadIntoFile(). An attacker may be able to guess a filename in silverstripe/assets via the AssetControlExtension. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12245'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-20... | {'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:50:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w7r7-r8r9-vrg2 | 2021-08-18T22:28:15Z | 2019-11-12T23:01:39Z | null | ['CVE-2019-12203'] | Session fixation in change password form | SilverStripe through 4.3.3 allows session fixation in the "change password" form. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12203'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/blob/4/docs/en/04_Changelogs/4.4.4.md#444'}, {'type': 'WEB', 'url': 'https://www.silverstri... | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:50:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q3p4-gw7r-wqjc | 2023-08-30T22:38:05Z | 2019-11-22T13:45:22Z | null | ['CVE-2019-12417'] | Apache Airflow vulnerable to XSS and local file disclosure | A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. This also presented a Local File Disclosure vulnerability to any file readable by the webserver process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12417'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f3aa5ff9c7cdb5424b6463c9013f6cf5db83d26c66ea77130cbbe1bc@%3Cusers.airflow.apache.org%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-21T04:09:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-62fx-3v4f-mwxm | 2021-08-18T22:23:23Z | 2019-11-12T22:59:40Z | null | ['CVE-2019-8133'] | Bypass of sitemp access restrictions | A security bypass vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. A user with privileges to generate sitemaps can bypass configuration that restricts directory access. The bypass allows overwrite of a subset of configuration files which can lead to denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8133'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8133.yaml'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-u... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:13:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8vh8-vc28-m2hf | 2022-02-11T21:12:59Z | 2019-11-20T01:33:54Z | null | ['CVE-2019-10212'] | Potential to access user credentials from the log files when debug logging enabled | A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10212'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0727'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10212'}, {'t... | {'cwe_ids': ['CWE-532'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T02:49:57Z', 'nvd_published_at': '2019-10-02T19:15:00Z'} |
1.4.0 | GHSA-58p8-9g59-q2hr | 2021-06-15T17:20:53Z | 2019-11-08T17:15:11Z | null | ['CVE-2019-12406'] | Potential DOS attack due to unrestricted attachment count in messages | Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a def... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.4'}]}]}, {'pa... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12406'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r92238967ba2783d3ab5a483f2e... | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-07T23:18:17Z', 'nvd_published_at': '2019-11-06T21:15:00Z'} |
1.4.0 | GHSA-xv69-f7x5-r4qw | 2023-09-06T13:45:11Z | 2019-11-12T22:59:43Z | null | ['CVE-2019-8145'] | Magento Cross-Site Scripting via Attribute Set Name | A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code into the attribute set name when listing the products. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8145'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8145.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:12:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c3gv-9cxf-6f57 | 2023-08-25T21:37:28Z | 2019-11-05T23:58:25Z | null | ['CVE-2019-15587'] | Loofah Allows Cross-site Scripting | In the Loofah gem for Ruby through v2.3.0, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15587'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/issues/171'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/commit/0c6617af440879ce97440f6eb6c58636456dc8ec'}, {'type': 'WEB', 'url': 'https://hackerone.com/repo... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-10-24T20:44:29Z', 'nvd_published_at': '2019-10-22T21:15:00Z'} |
1.4.0 | GHSA-6268-v434-45m5 | 2021-08-17T22:39:50Z | 2019-11-08T20:06:08Z | null | ['CVE-2019-16126'] | Cross-site Scripting in Grav | Grav through 1.6.15 allows (Stored) Cross-Site Scripting due to JavaScript execution in SVG images. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0-beta.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.0-beta.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16126'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/issues/2657'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T12:48:38Z', 'nvd_published_at': '2019-09-09T02:15:00Z'} |
1.4.0 | GHSA-pqm6-cgwr-x6pf | 2021-08-18T22:14:37Z | 2019-11-08T20:06:46Z | null | ['CVE-2019-3465'] | Signature validation bypass in XmlSecLibs | Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'robrichards/xmlseclibs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'robrichards/xmlseclibs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3465'}, {'type': 'WEB', 'url': 'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/11/msg00003.html'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-08T17:45:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fmmc-742q-jg75 | 2023-09-14T14:55:20Z | 2019-11-13T00:32:27Z | null | ['CVE-2019-16943'] | jackson-databind polymorphic typing issue | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 prior to 2.9.10.1, 2.8.11.5, and 2.6.7.3. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-d... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16943'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2478'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/328a0f833daf6baa443ac3b37c818a0204714b0b'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-13T00:30:39Z', 'nvd_published_at': '2019-10-01T17:15:00Z'} |
1.4.0 | GHSA-vvwv-h69m-wg6f | 2023-09-11T13:38:04Z | 2019-11-20T01:39:57Z | null | ['CVE-2019-12331'] | XXE in PHPSpreadsheet due to incomplete fix for previous encoding issue | PHPOffice PhpSpreadsheet before 1.8.0 has an XXE issue. The XmlScanner decodes the sheet1.xml from an .xlsx to utf-8 if something else than UTF-8 is declared in the header. This was a security measurement to prevent CVE-2018-19277 but the fix is not sufficient. By double-encoding the the xml payload to utf-7 it is poss... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpoffice/phpspreadsheet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12331'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPOffice/PhpSpreadsheet'}, {'type': 'WEB', 'url': 'https://github.com/PHPOffice/PhpSpreadsheet/blob/master/CHANGELOG.md#180---2019-07-01'}, {'type': 'WEB', 'url': 'https://github.com/PHPOffic... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:41:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x3j8-g4v9-67jq | 2021-01-08T00:47:47Z | 2019-02-18T23:56:51Z | null | ['CVE-2016-10619'] | Downloads Resources over HTTP in pennyworth | Affected versions of `pennyworth` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package i... | [] | [{'package': {'ecosystem': 'npm', 'name': 'pennyworth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10619'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x3j8-g4v9-67jq'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/213'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h2r4-4xgf-3865 | 2021-01-08T18:44:26Z | 2019-02-18T23:35:32Z | null | ['CVE-2016-10567'] | Downloads Resources over HTTP in product-monitor | Affected versions of `product-monitor` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `p... | [] | [{'package': {'ecosystem': 'npm', 'name': 'product-monitor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10567'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h2r4-4xgf-3865'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/171'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wh4h-v3f2-r2pp | 2023-09-05T18:00:56Z | 2019-02-12T15:36:37Z | null | ['CVE-2019-6975'] | Uncontrolled Memory Consumption in Django | Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the `django.utils.numberformat.format()` function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.utils.numberformat.format']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.19'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_funct... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6975'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/0bbb560183fabf0533289700845dafa94951f227'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/1f42f82566c9d2d73aff1c42790d6b1b243f7676'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hjhr-r3gq-qvp6 | 2020-08-31T18:10:37Z | 2019-02-18T23:39:44Z | null | ['CVE-2016-10535'] | Timing Attack in csrf-lite | Affected versions of `csrf-lite` are vulnerable to timing attacks as a result of testing CSRF tokens via a fail-early comparison instead of a constant-time comparison.
Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness ... | [] | [{'package': {'ecosystem': 'npm', 'name': 'csrf-lite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10535'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/csrf-lite/pull/1'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hjhr-r3gq-qvp6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/94'}] | {'cwe_ids': ['CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cr79-9pwf-r6f5 | 2021-09-16T20:42:47Z | 2019-02-18T23:34:24Z | null | ['CVE-2016-10591'] | Downloads Resources over HTTP in prince | Affected versions of `prince` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `prince`.
... | [] | [{'package': {'ecosystem': 'npm', 'name': 'prince'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10591'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cr79-9pwf-r6f5'}, {'type': 'PACKAGE', 'url': 'https://github.com/rse/node-prince'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/185'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-87g3-x896-w798 | 2021-01-08T19:11:36Z | 2019-02-18T23:56:53Z | null | ['CVE-2016-10620'] | Downloads Resources over HTTP in atom-node-module-installer | Affected versions of `atom-node-module-installer` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system... | [] | [{'package': {'ecosystem': 'npm', 'name': 'atom-node-module-installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10620'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-87g3-x896-w798'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/216'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qhm8-m2c4-9mw7 | 2021-01-08T01:58:31Z | 2019-02-18T23:45:11Z | null | ['CVE-2016-10656'] | Downloads Resources over HTTP in qbs | Affected versions of `qbs` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `qbs`.
## Re... | [] | [{'package': {'ecosystem': 'npm', 'name': 'qbs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10656'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qhm8-m2c4-9mw7'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/266'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rj38-87f3-93p6 | 2021-01-07T22:31:53Z | 2019-02-18T23:42:27Z | null | ['CVE-2016-10674'] | Downloads Resources over HTTP in limbus-buildgen | Affected versions of `limbus-buildgen` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `l... | [] | [{'package': {'ecosystem': 'npm', 'name': 'limbus-buildgen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10674'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rj38-87f3-93p6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/276'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7r2x-3qcm-8vfw | 2023-09-13T22:21:26Z | 2019-02-18T23:44:36Z | null | ['CVE-2016-10665'] | herbivore downloads Resources over HTTP | Affected versions of `herbivore` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `herbivo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'herbivore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10665'}, {'type': 'WEB', 'url': 'https://github.com/samatt/Herbivore/commit/0a041defc3463e99948e5d2064aef54b2128c5a3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7r2x-3qcm-8vfw'}, {'type': 'WEB', 'url': 'https://github.com/sam... | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5rm3-qhxf-rh3r | 2021-01-08T19:48:25Z | 2019-02-18T23:45:10Z | null | ['CVE-2016-10657'] | Downloads Resources over HTTP in co-cli-installer | Affected versions of `co-cli-installer` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `... | [] | [{'package': {'ecosystem': 'npm', 'name': 'co-cli-installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10657'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5rm3-qhxf-rh3r'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/268'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:19Z', 'nvd_published_at': None} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.