schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringclasses 24
values | aliases stringlengths 2 20 | summary stringlengths 9 130 ⌀ | details stringlengths 34 11.7k | severity stringlengths 2 92 | affected stringlengths 73 3.22k | references stringlengths 64 21.2k | database_specific stringlengths 131 202 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-mw36-7c6c-q4q2 | 2022-02-08T22:03:00Z | 2020-11-16T20:07:59Z | null | ['CVE-2020-26217'] | XStream can be used for Remote Code Execution | ### Impact
The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.14-jdk7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.13'}}] | [{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26217'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-16T20:06:06Z', 'nvd_published_at': '2020-11-16T21:15:00Z'} |
1.4.0 | GHSA-hpjm-3ww5-6cpf | 2021-01-07T22:41:42Z | 2020-11-18T21:06:07Z | null | ['CVE-2020-26216'] | Cross-Site Scripting through Fluid view helper arguments | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7)
> * CWE-79
### Problem
Three XSS vulnerabilities have been detected in Fluid:
1. TagBasedViewHelper allowed XSS throug maliciously crafted `additionalAttributes` arrays by creating keys with attribute-closing quotes followed by H... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.7'}]}]... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/Fluid/security/advisories/GHSA-hpjm-3ww5-6cpf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26216'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/Fluid/commit/f20db4e74cf9803c6cffca2ed2f03e1b0b89d0dc'}, {'type': 'WEB', 'url': 'https://typ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-17T20:30:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-94vp-rmqv-5875 | 2021-11-19T13:42:37Z | 2020-11-23T19:48:27Z | null | ['CVE-2020-15247'] | Twig Sandbox Escape by authenticated users with access to editing CMS templates when safemode is enabled. | ### Impact
An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed by the CMS due to `cms.enableSafeMode` being enabled is able to write specific Twig code to escape the Twig sandbox ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.469'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-94vp-rmqv-5875'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15247'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T19:33:21Z', 'nvd_published_at': '2020-11-23T20:15:00Z'} |
1.4.0 | GHSA-r89v-cgv7-3jhx | 2021-03-04T18:24:40Z | 2020-11-23T20:54:18Z | null | ['CVE-2020-26231'] | Bypass of fix for CVE-2020-15247, Twig sandbox escape | ### Impact
A bypass of CVE-2020-15247 (fixed in 1.0.469 and 1.1.0) was discovered that has the same impact as CVE-2020-15247:
An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.469'}, {'fixed': '1.0.470'}]}], 'versions': ['1.0.469']}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-r89v-cgv7-3jhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26231'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7'}, {'type': 'ADVISORY', ... | {'cwe_ids': ['CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T20:53:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-28fw-88hq-6jmm | 2020-11-13T18:25:26Z | 2020-11-13T18:26:03Z | null | [] | Persistent XSS in shopping worlds | ### Impact
Persistent XSS in shopping worlds
### Patches
We recommend updating to the current version 5.6.9. You can get the update to 5.6.9 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopwa... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-28fw-88hq-6jmm'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T18:25:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mjcr-rqjg-rhg3 | 2022-03-21T20:04:49Z | 2020-11-24T21:21:04Z | null | [] | Implementation trusts the "me" field returned by the authorization server without verifying it | ### Impact
A malicious user can sign in as a user with any IndieAuth identifier. This is because the implementation does not verify that the final `"me"` URL value returned by the authorization server belongs to the same domain as the initial value entered by the user.
### Patches
Version 1.1 fixes this issue.
### ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'datasette-indieauth'}, 'ecosystem_specific': {'affected_functions': ['datasette_indieauth.indieauth_page', 'datasette_indieauth.indieauth_done']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.1'}]}], 'versions': ['1.0']}] | [{'type': 'WEB', 'url': 'https://github.com/simonw/datasette-indieauth/security/advisories/GHSA-mjcr-rqjg-rhg3'}, {'type': 'WEB', 'url': 'https://github.com/simonw/datasette-indieauth/commit/376c8804c6b0811852049229a24336fe5eb6a439'}, {'type': 'PACKAGE', 'url': 'https://github.com/simonw/datasette-indieauth'}, {'type':... | {'cwe_ids': ['CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-11-24T21:20:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q76j-58cx-wp5v | 2020-11-13T17:28:31Z | 2020-11-13T17:28:49Z | null | [] | Vulnerability in RPKI manifest validation |
A vulnerability in RPKI manifest validation exists when objects on the manifest are hidden, or expired objects are replayed. An attacker successfully exploiting this vulnerability could prevent new ROAs from being received or selectively hide ROAs, causing routes to become INVALID.
To exploit this vulnerability, an a... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'net.ripe.rpki:rpki-validator-3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2-2020.10.28.23.06'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2-2020.10.28.22.25'}}] | [{'type': 'WEB', 'url': 'https://github.com/RIPE-NCC/rpki-validator-3/security/advisories/GHSA-q76j-58cx-wp5v'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T17:28:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-52q8-877j-gghq | 2020-11-11T15:51:56Z | 2020-11-11T15:54:51Z | null | ['CVE-2020-25074'] | remote code execution via cache action in MoinMoin | ### Impact
The cache action in action/cache.py allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to
the wiki can use this to achieve remote code execution.
### Patches
Users are strongly advised to upgrade to a patched version.
MoinMoin Wiki 1.9.11 has the necessary fix... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'moin'}, 'ecosystem_specific': {'affected_functions': ['moin.action.cache.execute']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-52q8-877j-gghq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25074'}, {'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/commit/6b96a9060069302996b5af47fd4a388fc80172b7'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-11-11T15:51:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-23f7-99jx-m54r | 2023-05-16T16:04:56Z | 2020-11-13T15:47:50Z | null | ['CVE-2020-26222'] | Remote code execution in dependabot-core branch names when cloning | ### Impact
Remote code execution vulnerability in `dependabot-common` and `dependabot-go_modules` when a source branch name contains malicious injectable bash code.
For example, if Dependabot is configured to use the following source branch name: `"/$({curl,127.0.0.1})"`, Dependabot will make a HTTP request to the fo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'dependabot-omnibus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.119.0.beta1'}, {'fixed': '0.125.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'dependabot-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.119.0.beta1'}, {'... | [{'type': 'WEB', 'url': 'https://github.com/dependabot/dependabot-core/security/advisories/GHSA-23f7-99jx-m54r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26222'}, {'type': 'WEB', 'url': 'https://github.com/dependabot/dependabot-core/pull/2727'}, {'type': 'WEB', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T15:47:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pfj3-56hm-jwq5 | 2021-01-07T22:39:49Z | 2020-11-24T23:48:38Z | null | ['CVE-2020-26238'] | Template injection in cron-utils | ### Impact
A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.cronutils:cron-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-pfj3-56hm-jwq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26238'}, {'type': 'WEB', 'url': 'https://github.com/jmrozanec/cron-utils/issues/461'}, {'type': 'WEB', 'url': 'https://github.com/jmrozanec/c... | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-11-24T23:48:26Z', 'nvd_published_at': '2020-11-25T00:15:00Z'} |
1.4.0 | GHSA-85rr-4rh9-hhwh | 2021-01-07T22:39:39Z | 2020-11-25T16:53:27Z | null | ['CVE-2020-26243'] | Memory leak in Nanopb | ### Impact
Decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded contains the submessage multiple times. This is rare in normal messages, but it is a concern when untrusted data i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nanopb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.2'}, {'fixed': '0.3.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.9.6'}}, {'package': {'ecosystem': 'PyPI', 'name': 'nanopb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [... | [{'type': 'WEB', 'url': 'https://github.com/nanopb/nanopb/security/advisories/GHSA-85rr-4rh9-hhwh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26243'}, {'type': 'WEB', 'url': 'https://github.com/nanopb/nanopb/issues/615'}, {'type': 'WEB', 'url': 'https://github.com/nanopb/nanopb/commit/4fe2... | {'cwe_ids': ['CWE-119', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-25T16:52:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-74hv-qjjq-h7g5 | 2020-11-24T21:42:40Z | 2020-11-24T22:59:08Z | null | [] | datasette-graphql leaks details of the schema of private database files | ### Impact
When running against a Datasette instance with private databases, `datasette-graphql` would expose the schema of those database tables - but not the table contents.
### Patches
Patched in version 1.2.
### Workarounds
This issue is only present if a Datasette instance that includes private databases and ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'datasette-graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/simonw/datasette-graphql/security/advisories/GHSA-74hv-qjjq-h7g5'}, {'type': 'WEB', 'url': 'https://pypi.org/project/datasette-graphql/'}] | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-24T21:42:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8jq6-w5cg-wm45 | 2020-11-11T21:38:07Z | 2020-11-11T21:38:18Z | null | [] | Exploitable inventory component chaining in PocketMine-MP | ### Impact
Specially crafted `InventoryTransactionPacket`s sent by malicious clients were able to exploit the behaviour of `InventoryTransaction->findResultItem()` and cause it to take an abnormally long time to execute (causing an apparent server freeze).
The affected code is intended to compact conflicting `Inventor... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-8jq6-w5cg-wm45'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-11T21:38:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4q96-6xhq-ff43 | 2022-10-19T15:37:02Z | 2020-11-11T15:54:41Z | null | ['CVE-2020-15275'] | malicious SVG attachment causing stored XSS vulnerability | ### Impact
An attacker with `write` permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki.
### Patches
Users are strongly advised to upgrade to a patched version.
MoinMoin Wiki 1.9.11 has the neces... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'moin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-4q96-6xhq-ff43'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15275'}, {'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-11T15:49:35Z', 'nvd_published_at': '2020-11-11T16:15:00Z'} |
1.4.0 | GHSA-4v2w-h9jm-mqjg | 2021-01-07T22:40:03Z | 2020-11-27T16:07:15Z | null | ['CVE-2020-26245'] | Prototype Pollution in systeminformation | ### Impact
command injection vulnerability by prototype pollution
### Patches
Problem was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. Please upgrade to version >= 4.30.2
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'systeminformation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.30.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-4v2w-h9jm-mqjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26245'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/8113ff0e87b2f422a5756c48f1057575e73af... | {'cwe_ids': ['CWE-471', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-27T15:56:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6h7f-qwqm-35pp | 2023-09-07T22:36:42Z | 2020-11-06T18:06:16Z | null | ['CVE-2020-7763'] | Arbitrary File Read in phantom-html-to-pdf | This affects the package phantom-html-to-pdf before 0.6.1.
### PoC
```js
var fs = require('fs') var conversion = require("phantom-html-to-pdf")();
conversion.allowLocalFilesAccess = false conversion({
html: "document.write(window.location='c:/windows/win.ini')"
}, function(err, pdf) {
var output = fs.createWri... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'phantom-html-to-pdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.6.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7763'}, {'type': 'WEB', 'url': 'https://github.com/pofider/phantom-html-to-pdf/commit/b5d2da2639a49a95e0bdb3bc0c987cb6406b8259'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598'}, {'type': 'WEB', 'url': 'https://www.n... | {'cwe_ids': ['CWE-200', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-06T18:02:24Z', 'nvd_published_at': '2020-11-05T14:15:00Z'} |
1.4.0 | GHSA-6gv9-7q4g-pmvm | 2020-11-13T01:17:58Z | 2020-11-13T15:47:36Z | null | [] | Persistent XSS in customer module in Shopware | ### Impact
Persistent XSS in customer module
### Patches
We recommend updating to the current version 5.6.9. You can get the update to 5.6.9 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopw... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-6gv9-7q4g-pmvm'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T01:17:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fx3v-553x-3c4q | 2021-03-04T18:24:54Z | 2020-11-23T19:47:59Z | null | ['CVE-2020-15249'] | Stored XSS by authenticated backend user with access to upload files | ### Impact
Backend users with access to upload files were permitted to upload SVG files without any sanitization applied to the uploaded files. Since SVG files support being parsed as HTML by browsers, this means that they could theoretically upload Javascript that would be executed on a path under the website's domain... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.469'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-fx3v-553x-3c4q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15249'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T19:47:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j977-g5vj-j27g | 2021-01-07T22:49:01Z | 2020-11-09T14:21:17Z | null | ['CVE-2020-7750'] | Cross-Site Scripting in scratch-svg-renderer | This affects the package scratch-svg-renderer before 0.2.0-prerelease.20201019174008. The loadString function does not escape SVG properly, which can be used to inject arbitrary elements into the DOM via the _transformMeasurements function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'scratch-svg-renderer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0-prerelease.20201019174008'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0-prerelease.20201016121710'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7750'}, {'type': 'WEB', 'url': 'https://github.com/LLK/scratch-svg-renderer/commit/9ebf57588aa596c4fa3bb64209e10ade395aee90'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SCRATCHSVGRENDERER-1020497'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-09T14:09:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4mp3-385r-v63f | 2020-11-24T21:47:35Z | 2020-11-24T22:58:58Z | null | ['CVE-2020-26890'] | Denial of service attack due to invalid JSON | ### Impact
A denial of service attack against Matrix clients can be exploited by sending an event including invalid JSON data to Synapse. Synapse would relay the data to clients which could crash or hang. Impact is long-lasting if the event is made part of the room state.
### Patches
At a minimum #8106 and #8291 must ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.20.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-4mp3-385r-v63f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26890'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7YXMMYQP46PYL6... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-24T21:47:35Z', 'nvd_published_at': '2020-11-24T03:15:00Z'} |
1.4.0 | GHSA-hrfh-fp4x-crrq | 2020-11-13T18:00:57Z | 2020-11-13T18:26:06Z | null | [] | Persistent XSS in newsletter module in Shopware | ### Impact
Persistent XSS in newsletter module
### Patches
We recommend updating to the current version 5.6.9. You can get the update to 5.6.9 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shop... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-hrfh-fp4x-crrq'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T18:00:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q9cp-mc96-m4w2 | 2021-01-07T22:39:29Z | 2020-11-23T21:18:44Z | null | ['CVE-2020-26229'] | XML External Entity in Dashboard Widget | ### Problem
It has been discovered that RSS widgets are susceptible to XML external entity processing.
This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability with current PHP versions of supported and maintained system distributions.
At least with _libxml2_ v... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.4.0'}, {'fixed': '10.4.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-q9cp-mc96-m4w2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26229'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2020-012'}] | {'cwe_ids': ['CWE-611'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T21:16:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gvqv-779r-4jgp | 2020-11-27T20:06:27Z | 2020-11-27T20:13:05Z | null | ['CVE-2020-16017'] | Use after free in CefSharp | CVE-2020-16017: Use after free in site isolation
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
Google is aware of reports that exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild.
There is current... | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.0.241'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Wpf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.0.241'}]}]}, {'package': ... | [{'type': 'WEB', 'url': 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-gvqv-779r-4jgp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16017'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-27T20:06:27Z', 'nvd_published_at': '2021-01-08T19:15:00Z'} |
1.4.0 | GHSA-xwjr-6fj7-fc6h | 2021-11-19T13:46:03Z | 2020-11-23T19:48:12Z | null | ['CVE-2020-15246'] | Local File Inclusion by unauthenticated users | ### Impact
An attacker can exploit this vulnerability to read local files on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request.
### Patches
Issue has been patched in Build 469 (v1.0.469) and v1.1.0.
### Workarounds
Apply https://github.com/octobercms/libr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.421'}, {'fixed': '1.0.469'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-xwjr-6fj7-fc6h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15246'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-22', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T19:23:14Z', 'nvd_published_at': '2020-11-23T20:15:00Z'} |
1.4.0 | GHSA-rrfp-j2mp-hq9c | 2021-08-26T15:20:27Z | 2020-11-13T17:13:04Z | null | ['CVE-2020-15265'] | Segfault in `tf.quantization.quantize_and_dequantize` | ### Impact
An attacker can pass an invalid `axis` value to `tf.quantization.quantize_and_dequantize`:
```python
tf.quantization.quantize_and_dequantize(
input=[2.5, 2.5], input_min=[0,0], input_max=[1,1], axis=10)
```
This results in accessing [a dimension outside the rank of the input tensor](https://github.com/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrfp-j2mp-hq9c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15265'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/42105'}, {'type': 'WEB', 'url': 'https://github.com/tensorf... | {'cwe_ids': ['CWE-125'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T17:11:27Z', 'nvd_published_at': '2020-10-21T21:15:00Z'} |
1.4.0 | GHSA-954j-f27r-cj52 | 2021-01-07T22:40:37Z | 2020-11-23T21:18:36Z | null | ['CVE-2020-26228'] | Cleartext storage of session identifier | User session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system.
### Solution
Update to TYPO3 ver... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.10'}]}]... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-954j-f27r-cj52'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26228'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2020-011'}] | {'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T21:10:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x7fx-mcc9-27j7 | 2020-11-27T20:12:35Z | 2020-11-27T20:12:55Z | null | ['CVE-2020-16013'] | Inappropriate implementation in V8 in CefSharp | High CVE-2020-16013: Inappropriate implementation in V8.
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
Google is aware of reports that exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild.
There i... | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.0.241'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Wpf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.0.241'}]}]}, {'package': ... | [{'type': 'WEB', 'url': 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-x7fx-mcc9-27j7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16013'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-27T20:12:35Z', 'nvd_published_at': '2021-01-08T19:15:00Z'} |
1.4.0 | GHSA-rfjc-xrmf-5vvw | 2021-11-19T13:40:25Z | 2020-11-23T19:47:27Z | null | ['CVE-2020-15248'] | Privilege escalation by backend users assigned to the default "Publisher" system role | ### Impact
Backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access.
### Patches
Issue has been patched in Build 470 (v1.0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.470'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15248'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T19:40:34Z', 'nvd_published_at': '2020-11-23T20:15:00Z'} |
1.4.0 | GHSA-g3wg-6mcf-8jj6 | 2022-02-08T22:03:47Z | 2020-11-04T17:50:24Z | null | ['CVE-2020-27216'] | Local Temp Directory Hijacking Vulnerability | ### Impact
On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.33'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed'... | [{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27216'}, ... | {'cwe_ids': ['CWE-378', 'CWE-379', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-04T17:48:31Z', 'nvd_published_at': '2020-10-23T13:15:00Z'} |
1.4.0 | GHSA-58w4-w77w-qv3w | 2021-01-07T22:42:05Z | 2020-11-16T21:23:29Z | null | ['CVE-2020-26225'] | Reflected XSS with parameters in PostComment | ### Impact
An attacker could inject malicious web code into the users' web browsers by creating a malicious link.
### Patches
The problem is fixed in 4.2.0
### References
[Cross-site Scripting (XSS) - Reflected (CWE-79) ](https://cwe.mitre.org/data/definitions/79.html) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/productcomments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-58w4-w77w-qv3w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26225'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/commit/c56e3e9495c4a0a9c1e7dc43e1bb0fcad2796dbf'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-16T21:22:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vfrc-7r7c-w9mx | 2022-10-20T13:52:50Z | 2020-11-24T22:58:41Z | null | ['CVE-2020-26237'] | Prototype Pollution in highlight.js | ### Impact
Affected versions of this package are vulnerable to Prototype Pollution. A malicious HTML code block can be crafted that will result in prototype pollution of the base object's prototype during highlighting. If you allow users to insert custom HTML code blocks into your page/app via parsing Markdown code ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'highlight.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.18.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'highlight.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26237'}, {'type': 'WEB', 'url': 'https://github.com/highlightjs/highlight.js/pull/2636'}, {'type': 'WEB', 'url': 'https://github.com/high... | {'cwe_ids': ['CWE-471'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-24T22:56:50Z', 'nvd_published_at': '2020-11-24T23:15:00Z'} |
1.4.0 | GHSA-grfj-wjv9-4f9v | 2021-01-07T22:40:24Z | 2020-11-24T21:20:52Z | null | ['CVE-2020-26232'] | Open redirect in Jupyter Server | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Open redirect vulnerability - a maliciously crafted link to a jupyter server could redirect the browser to a different website.
All jupyter servers are technically affected, however, these maliciously crafted links can only be reasonably made for known j... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jupyter/jupyter_server/security/advisories/GHSA-grfj-wjv9-4f9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26232'}, {'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/commit/3d83e49090289c431da253e2bdb8dc479cbcb157'}, {'type... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-24T21:10:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xwhf-g6j5-j5gc | 2021-08-26T15:20:47Z | 2020-11-13T17:18:29Z | null | ['CVE-2020-15266'] | Float cast overflow undefined behavior | ### Impact
When the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault.
### Patches
We have patched the issue in c0319231333f... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xwhf-g6j5-j5gc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15266'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/42129'}, {'type': 'WEB', 'url': 'https://github.com/tensorf... | {'cwe_ids': ['CWE-119'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T17:17:13Z', 'nvd_published_at': '2020-10-21T21:15:00Z'} |
1.4.0 | GHSA-r2j6-p67h-q639 | 2021-01-07T22:41:34Z | 2020-11-18T21:19:14Z | null | ['CVE-2020-26226'] | Secret disclosure when containing characters that become URI encoded | ### Impact
Secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL.
### Patches
Fixed in v17.2.3
### Workarounds
Secrets that do not contain characters that become encoded when included in a URL are already mask... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'semantic-release'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.2.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 17.2.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26226'}, {'type': 'WEB', 'url': 'https://github.com/semantic-release/semantic-release/commit/ca90b34c4a9333438cc4d69faeb43362bb9... | {'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-18T21:18:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5hmm-x8q8-w5jh | 2021-01-07T22:49:18Z | 2020-11-06T17:35:49Z | null | ['CVE-2020-26214'] | LDAP authentication bypass with empty password | ### Impact
Users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider.
Only deployments where LDAP servers are configured to allow unauthenticated binds (eg. default on Active Directory) are affected.
### Patches
A fix ha... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'alerta-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.1.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'alerta-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.5.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/alerta/alerta/security/advisories/GHSA-5hmm-x8q8-w5jh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26214'}, {'type': 'WEB', 'url': 'https://github.com/alerta/alerta/issues/1277'}, {'type': 'WEB', 'url': 'https://github.com/alerta/alerta/pull/1345'... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-06T17:34:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wpww-4jf4-4hx8 | 2021-01-07T22:49:25Z | 2020-11-04T21:08:38Z | null | ['CVE-2020-15273'] | Edit feed settings and others, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0 | baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS).
Impact: XSS via Arbitrary script execution.
Attack vector is: Administrator must be logged in.
Components are: Edit feed settings, Edit widget area, Sub site new registration, New category registration
Tested baserCMS Version : 4.4.0 (Latest)
Affect... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15273'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-04T21:07:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m9hw-7xfv-wqg7 | 2020-11-12T19:35:53Z | 2020-11-12T19:36:14Z | null | [] | Prototype Pollution in json-logic-js | Versions of json-logic-js prior to 2.0.0 are vulnerable to Prototype Pollution. The method operation allows a malicious user to modify the prototype of Object through the method property name. This causes modification of any existing property that will exist on all objects and leads to Remote Code Execution.
The follo... | [] | [{'package': {'ecosystem': 'npm', 'name': 'json-logic-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jwadhams/json-logic-js/commit/fadfa5dc7ccd1cc5c9a1900a97a15af390bf642b'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1542'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/json-logic-js'}] | {'cwe_ids': ['CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-12T19:35:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p694-23q3-rvrc | 2022-03-18T20:16:31Z | 2020-11-04T18:23:25Z | null | ['CVE-2017-15708'] | Remote Code Execution in Apache Synapse | In Apache Synapse, by default no authentication is required for Java Remote Method Invocation (RMI). So Apache Synapse 3.0.1 or all previous releases (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2, 1.1.1) allows remote code execution attacks that can be performed by injecting specially crafted serialized objects. And the presence of... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.synapse:synapse-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15708'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/77f2accf240d25d91b47033e2f8ebec84ffbc6e6627112b2f98b66c9@%3Cdev.synapse.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0fb289cd38c915b9a13a3376134... | {'cwe_ids': ['CWE-502', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-11-04T18:21:43Z', 'nvd_published_at': '2017-12-11T15:29:00Z'} |
1.4.0 | GHSA-jgrh-5m3h-9c5f | 2020-11-10T20:19:42Z | 2020-11-09T22:17:13Z | null | ['CVE-2020-7764'] | Web Cache Poisoning in find-my-way | This affects the package find-my-way before 2.2.5, from 3.0.0 and before 3.0.5. It accepts the Accept-Version' header by default, and if versioned routes are not being used, this could lead to a denial of service. Accept-Version can be used as an unkeyed header in a cache poisoning attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'find-my-way'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'find-my-way'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7764'}, {'type': 'WEB', 'url': 'https://github.com/delvedor/find-my-way/commit/ab408354690e6b9cf3c4724befb3b3fa4bb90aac'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FINDMYWAY-1038269'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/packa... | {'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-09T22:16:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-58r4-h6v8-jcvm | 2023-05-16T16:04:23Z | 2020-11-03T02:31:38Z | null | ['CVE-2020-15240'] | Regression in JWT Signature Validation | ### Overview
Versions after and including `2.3.0` are improperly validating the JWT token signature when using the `JWTValidator.verify` method. Improper validation of the JWT token signature when not using the default Authorization Code Flow can allow an attacker to bypass authentication and authorization.
### Am I ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-auth0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/omniauth-auth0/security/advisories/GHSA-58r4-h6v8-jcvm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15240'}, {'type': 'WEB', 'url': 'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-287', 'CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T19:10:29Z', 'nvd_published_at': '2020-10-21T18:15:00Z'} |
1.4.0 | GHSA-m2jr-hmc3-qmpr | 2023-05-16T16:19:18Z | 2020-11-13T17:18:22Z | null | ['CVE-2020-26223'] | Authorization bypass in Spree | ### Impact
The perpetrator could query the [API v2 Order Status](https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status) endpoint with an empty string passed as an Order token
### Patches
Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree < 3.7 are not affected... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'spree_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': ... | [{'type': 'WEB', 'url': 'https://github.com/spree/spree/security/advisories/GHSA-m2jr-hmc3-qmpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26223'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree/pull/10573'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T17:18:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c7vm-f5p4-8fqh | 2021-01-07T22:41:59Z | 2020-11-18T21:06:36Z | null | ['CVE-2020-26215'] | Open redirect in Jupyter Notebook | [localhost](http://localhost:8888)
### Impact
_What kind of vulnerability is it? Who is impacted?_
Open redirect vulnerability - a maliciously crafted link to a notebook server could redirect the browser to a different website.
All notebook servers are technically affected, however, these maliciously crafted links c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.4'}}] | [{'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26215'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/3cec4bbe21756de9f0c4bccf18cf61d840314d74'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-18T21:05:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4rcq-jv2f-898j | 2023-01-27T21:41:57Z | 2020-05-08T19:05:05Z | null | ['CVE-2020-11054'] | Incorrect Provision of Specified Functionality in qutebrowser | # Description
After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (`colors.statusbar.url.warn.fg`). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (`colors.statusbar.url.success_https`). While the user already has see... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'qutebrowser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-4rcq-jv2f-898j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11054'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/issues/5403'}, {'type': 'WEB', 'url': 'https://github.com/qute... | {'cwe_ids': ['CWE-684'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-05-08T19:04:30Z', 'nvd_published_at': '2020-05-07T21:15:00Z'} |
1.4.0 | GHSA-px9h-x66r-8mpc | 2021-08-25T21:08:32Z | 2020-05-13T16:29:26Z | null | ['CVE-2020-7647'] | path traversal in Jooby | ### Impact
Access to sensitive information available from classpath.
### Patches
Patched version: 1.6.7 and 2.8.2
Commit 1.x: https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009
Commit 2.x: https://github.com/jooby-project/jooby/commit/c81479de67036993f406ccdec23990b44b0bec32
###... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jooby:jooby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jooby:jooby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/security/advisories/GHSA-px9h-x66r-8mpc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7647'}, {'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009'}, {'type': 'PACKAGE', ... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-12T20:27:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v3xw-c963-f5hc | 2021-08-25T20:59:49Z | 2020-05-15T18:58:50Z | null | ['CVE-2020-11111'] | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11111'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2664'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:31:18Z', 'nvd_published_at': '2020-03-31T05:15:00Z'} |
1.4.0 | GHSA-7qx4-pp76-vrqh | 2021-07-28T18:49:53Z | 2020-05-21T19:08:08Z | null | ['CVE-2020-1953'] | Remote code execution in Apache Commons Configuration | Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-configuration2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1953'}, {'type': 'WEB', 'url': 'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-21T17:12:19Z', 'nvd_published_at': '2020-03-13T15:15:00Z'} |
1.4.0 | GHSA-w64w-qqph-5gxm | 2023-05-16T15:55:12Z | 2020-05-22T14:55:09Z | null | ['CVE-2020-11077'] | HTTP Smuggling via Transfer-Encoding Header in Puma | ### Impact
This is a similar but different vulnerability to the one patched in 3.12.5 and 4.3.4.
A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client.
If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-w64w-qqph-5gxm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11077'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/blob/master/History.md#434435-... | {'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-22T14:46:33Z', 'nvd_published_at': '2020-05-22T15:15:00Z'} |
1.4.0 | GHSA-rf6r-2c4q-2vwg | 2021-08-25T20:58:41Z | 2020-05-15T18:58:54Z | null | ['CVE-2020-10968'] | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10968'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2662'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind/'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:30:49Z', 'nvd_published_at': '2020-03-26T13:15:00Z'} |
1.4.0 | GHSA-cc94-3v9c-7rm8 | 2021-06-15T17:57:09Z | 2020-05-21T21:08:56Z | null | ['CVE-2020-1941'] | Apache ActiveMQ webconsole admin GUI is open to XSS | In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-web-console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.15.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1941'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-21T17:36:06Z', 'nvd_published_at': '2020-05-14T17:15:00Z'} |
1.4.0 | GHSA-gg84-qgv9-w4pq | 2021-01-08T20:16:56Z | 2020-05-20T15:55:47Z | null | ['CVE-2020-11078'] | CRLF injection in httplib2 | ### Impact
Attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server.
Impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping.
### Patches
P... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'httplib2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/httplib2/httplib2/security/advisories/GHSA-gg84-qgv9-w4pq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11078'}, {'type': 'WEB', 'url': 'https://github.com/httplib2/httplib2/commit/a1457cc31f3206cf691d11d2bf34e98865873e9e'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-93'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-05-20T15:55:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x7jg-6pwg-fx5h | 2023-05-16T15:53:31Z | 2020-05-22T14:55:05Z | null | ['CVE-2020-11076'] | HTTP Smuggling via Transfer-Encoding Header in Puma | ### Impact
By using an invalid transfer-encoding header, an attacker could [smuggle an HTTP response.](https://portswigger.net/web-security/request-smuggling)
Originally reported by @ZeddYu, who has our thanks for the detailed report.
### Patches
The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
### For mo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11076'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-22T14:40:36Z', 'nvd_published_at': '2020-05-22T15:15:00Z'} |
1.4.0 | GHSA-q93h-jc49-78gg | 2023-09-14T15:09:39Z | 2020-05-15T18:59:10Z | null | ['CVE-2020-9547'] | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4, 2.8.11.6, and 2.7.9.7 mishandles the interaction between serialization gadgets and typing, related to `com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig` (aka `ibatis-sqlmap`). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-d... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9547'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2634'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/9f4e97019fb0dd836533d0b6198c88787e235ae2'}, {'type': 'PACKAGE', 'url': 'https:... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T20:58:56Z', 'nvd_published_at': '2020-03-02T04:15:00Z'} |
1.4.0 | GHSA-r5jw-62xg-j433 | 2021-09-23T13:55:11Z | 2020-05-28T21:10:11Z | null | ['CVE-2020-11082'] | Cross-Site Scripting in Kaminari | ### Impact
In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1.
### Releases
The 1.2.1 gem including the patch has already been released.
All past released versions are affected by this vulnerability.
#... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'kaminari'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/kaminari/kaminari/security/advisories/GHSA-r5jw-62xg-j433'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11082'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-review/pull/1020'}, {'type': 'WEB', 'url': 'https://github.com/kaminari/kami... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-28T21:05:32Z', 'nvd_published_at': '2020-05-28T21:15:00Z'} |
1.4.0 | GHSA-2m7g-9q74-9m3q | 2021-08-25T21:06:45Z | 2020-05-06T20:49:04Z | null | ['CVE-2020-1929'] | Improper Certificate Validation in Apache Beam | The Apache Beam MongoDB connector in versions 2.10.0 to 2.16.0 has an option to disable SSL trust verification. However this configuration is not respected and the certificate verification disables trust verification in every case. This exclusion also gets registered globally which disables trust checking for any code ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.beam:beam-sdks-java-io-mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.17.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.16.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1929'}, {'type': 'WEB', 'url': 'https://github.com/apache/beam/commit/a7dd23d95d2d214b4110781b5a28802bd43b834b'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/beam'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd0e85b71b... | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-06T20:48:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jp5v-5gx4-jmj9 | 2023-08-08T15:18:54Z | 2020-05-26T15:11:13Z | null | ['CVE-2020-8166'] | Ability to forge per-form CSRF tokens in Rails | It is possible to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token for any action for that session.
Impact
------
Given the ability to extract the global CSRF token, an attacker would be able to construct a per-form CSRF token for that session.
Workar... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.2'}}, {'package': {'ecosystem': 'RubyGems',... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8166'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/732415'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8166.yml'... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-26T15:10:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-46j2-xjgp-jrfm | 2023-01-23T20:28:50Z | 2020-05-21T21:09:38Z | null | ['CVE-2020-8151'] | Information disclosure issue in Active Resource | There is a possible information disclosure issue in Active Resource <v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activeresource'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8151'}, {'type': 'WEB', 'url': 'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/activeresource'}, {'type': 'WEB', 'url': 'https://groups.google.com/foru... | {'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-21T17:46:20Z', 'nvd_published_at': '2020-05-12T13:15:00Z'} |
1.4.0 | GHSA-8727-m6gj-mc37 | 2023-09-25T16:55:14Z | 2020-05-26T15:09:16Z | null | ['CVE-2020-8164'] | Possible Strong Parameters Bypass in ActionPack | There is a strong parameters bypass vector in ActionPack.
Versions Affected: rails <= 6.0.3
Not affected: rails < 5.0.0
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
In some cases user supplied information can be inadvertently leaked from
Strong Parameters. Specifically the return value... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.2'}}, {'package': {'ecosystem': 'RubyGems',... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8164'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/292797'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8164.yml'... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-26T15:06:53Z', 'nvd_published_at': '2020-06-19T17:15:00Z'} |
1.4.0 | GHSA-fqwf-pjwf-7vqv | 2023-09-14T15:37:11Z | 2020-05-15T18:59:04Z | null | ['CVE-2020-10673'] | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 and 2.6.7.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-d... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10673'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2660'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/1645efbd392989cf015f459a91c999e59c921b15'}, {'type': 'PACKAGE', 'url': 'https... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T20:59:03Z', 'nvd_published_at': '2020-03-18T22:15:00Z'} |
1.4.0 | GHSA-2wj9-434x-9hvp | 2021-01-08T20:16:42Z | 2020-05-13T23:29:04Z | null | ['CVE-2020-11067'] | Insecure Deserialization in Backend User Settings in TYPO3 CMS | It has been discovered that backend user settings (in $BE_USER->uc) are vulnerable to insecure deserialization. In combination with vulnerabilities of 3rd party components this can lead to remote code execution. A valid backend user account is needed to exploit this vulnerability.
Update to TYPO3 versions 9.5.17 or 10... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.17'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.2'}]}]}... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2wj9-434x-9hvp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11067'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T23:28:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r854-96gq-rfg3 | 2023-09-05T09:25:57Z | 2020-05-18T17:41:19Z | null | ['CVE-2014-1933'] | Pillow Temporary file name leakage | The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1933'}, {'type': 'WEB', 'url': 'https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-imaging/Pillow'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-05-18T17:41:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h98h-8mxr-m8gx | 2021-08-25T21:09:12Z | 2020-05-13T16:01:35Z | null | ['CVE-2018-21233'] | Out-of-bounds read in TensorFlow possibly causing disclosure of the contents of process memory. | TensorFlow before 1.7.0 has an integer overflow that causes an out-of-bounds read, possibly causing disclosure of the contents of process memory. This occurs in the DecodeBmp feature of the BMP decoder in core/kernels/decode_bmp_op.cc. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21233'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/49f73c55d56edffebde4bca4a407ad69c1cae433'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow/'}, {'type': 'WEB', 'url': 'https://github.com/tensorf... | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T16:01:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j7vx-8mqj-cqp9 | 2021-07-29T16:42:27Z | 2020-05-07T21:11:07Z | null | ['CVE-2020-10187'] | Exposure of Sensitive Information to an Unauthorized Actor in Doorkeeper | ### Impact
Information disclosure vulnerability. Allows an attacker to see all `Doorkeeper::Application` model attribute values (including secrets) using authorized applications controller if it's enabled (GET /oauth/authorized_applications.json).
### Patches
These versions have the fix:
* 5.0.3
* 5.1.1
* 5.2.5
* 5.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.1'}]}], 'versions': ... | [{'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/security/advisories/GHSA-j7vx-8mqj-cqp9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10187'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/pull/446'}, {'type': 'WEB', 'url': 'https://github.com/door... | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-07T21:09:24Z', 'nvd_published_at': '2020-05-04T14:15:00Z'} |
1.4.0 | GHSA-gw55-jm4h-x339 | 2021-10-08T19:56:49Z | 2020-05-08T18:54:39Z | null | ['CVE-2020-11050'] | Improper Validation of Certificate with Host Mismatch in Java-WebSocket | The Java-WebSocket Client does not perform hostname verification.
- This means that SSL certificates of other hosts are accepted as long as they are trusted. To exploit this vulnerability an attacker has to perform a man-in-the-middle (MITM) attack between a Java application using the Java-WebSocket Client and an Web... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.java-websocket:Java-WebSocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/TooTallNate/Java-WebSocket/security/advisories/GHSA-gw55-jm4h-x339'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11050'}, {'type': 'PACKAGE', 'url': 'https://github.com/TooTallNate/Java-WebSocket'}] | {'cwe_ids': ['CWE-295', 'CWE-297'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-08T18:54:10Z', 'nvd_published_at': '2020-05-07T21:15:00Z'} |
1.4.0 | GHSA-pqg8-crx9-g8m4 | 2021-11-08T18:49:16Z | 2020-05-13T23:40:09Z | null | ['CVE-2020-11069'] | Backend Same-Site Request Forgery in TYPO3 CMS | > ### Meta
> * CVSS v3.1: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
> * CWE-352
> * CWE-346
### Problem
It has been discovered that backend user interface and install tool are vulnerable to same-origin request forgery. A backend user can be tricked into interacting with a malicious resource an attacker previou... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.17'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.2'}]}]}... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-pqg8-crx9-g8m4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11069'}] | {'cwe_ids': ['CWE-346', 'CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T23:38:41Z', 'nvd_published_at': '2020-05-14T00:15:00Z'} |
1.4.0 | GHSA-q4m3-2j7h-f7xw | 2023-09-08T21:03:13Z | 2020-05-20T16:18:01Z | null | ['CVE-2020-7656'] | Cross-Site Scripting in jquery | Versions of `jquery` prior to 1.9.0 are vulnerable to Cross-Site Scripting. The load method fails to recognize and remove `<script>` HTML tags that contain a whitespace character, i.e: `</script >`, which results in the enclosed script logic to be executed. This allows attackers to execute arbitrary JavaScript in a vic... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7656'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/blob/9e6393b0bcb52b15313f88141d0bd7dd54227426/src/ajax.js#L203'}, {'type': 'WEB', 'url': 'https://github.com/rails/jque... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-20T16:17:45Z', 'nvd_published_at': '2020-05-19T21:15:00Z'} |
1.4.0 | GHSA-jjjr-3jcw-f8v6 | 2021-01-08T20:20:13Z | 2020-05-07T18:04:53Z | null | ['CVE-2020-11037'] | Potential Observable Timing Discrepancy in Wagtail | ### Impact
A potential timing attack exists on pages or documents that have been protected with a shared password through Wagtail's "Privacy" controls. This password check is performed through a character-by-character string comparison, and so an attacker who is able to measure the time taken by this check to a high de... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-jjjr-3jcw-f8v6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11037'}] | {'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-07T18:04:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f7hx-fqxw-rvvj | 2023-01-20T22:02:41Z | 2020-05-27T16:37:02Z | null | ['CVE-2020-13625'] | Insufficient output escaping of attachment names in PHPMailer | ### Impact
CWE-116: Incorrect output escaping.
An attachment added like this (note the double quote within the attachment name, which is entirely valid):
$mail->addAttachment('/tmp/attachment.tmp', 'filename.html";.jpg');
Will result in a message containing these headers:
Content-Type: application/octet-str... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-f7hx-fqxw-rvvj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13625'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/commit/c2796cb1cb99d7717290b48c4e6f32cb6c60b7b3'}, {'type': 'PACKAGE',... | {'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-27T16:34:44Z', 'nvd_published_at': '2020-06-08T17:15:00Z'} |
1.4.0 | GHSA-p43x-xfjf-5jhr | 2023-09-14T15:34:32Z | 2020-05-15T18:59:01Z | null | ['CVE-2020-9548'] | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4, 2.8.11.6, and 2.7.9.7 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-d... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9548'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2634'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/9f4e97019fb0dd836533d0b6198c88787e235ae2'}, {'type': 'PACKAGE', 'url': 'https:... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:24:13Z', 'nvd_published_at': '2020-03-02T04:15:00Z'} |
1.4.0 | GHSA-5mh9-r3rr-9597 | 2021-08-25T21:12:09Z | 2020-05-21T21:08:33Z | null | ['CVE-2020-5529'] | Code execution vulnerability in HtmlUnit | HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.sourceforge.htmlunit:htmlunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.37.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5529'}, {'type': 'WEB', 'url': 'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367'}, {'type': 'PACKAGE', 'url': 'https://github.com/HtmlUnit/htmlunit'}, {'type': 'WEB', 'url': 'https://github.com/HtmlUnit/htmlunit... | {'cwe_ids': ['CWE-665'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-21T17:25:38Z', 'nvd_published_at': '2020-02-11T12:15:00Z'} |
1.4.0 | GHSA-6jmf-mxwf-r3jc | 2021-06-15T17:25:57Z | 2020-05-12T00:39:27Z | null | ['CVE-2019-12399'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache Kafka | When Connect workers in Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, or 2.3.0 are configured with one or more config providers, and a connector is created/updated on that Connect cluster to use an externalized secret variable in a substring of a connector configuration property value, then any client can issu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12399'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0e3a613705d70950aca2bfe9a6265c87503921852d9a3dbce512ca9f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2d390dec5f360ec8aa294bef... | {'cwe_ids': ['CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-11T20:29:01Z', 'nvd_published_at': '2020-01-14T15:15:00Z'} |
1.4.0 | GHSA-jc8m-cxhj-668x | 2023-05-16T16:16:57Z | 2020-05-07T21:16:46Z | null | ['CVE-2020-11052'] | Improper Restriction of Excessive Authentication Attempts in Sorcery | ### Impact
Brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sorcery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Sorcery/sorcery/security/advisories/GHSA-jc8m-cxhj-668x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11052'}, {'type': 'WEB', 'url': 'https://github.com/Sorcery/sorcery/issues/231'}, {'type': 'WEB', 'url': 'https://github.com/Sorcery/sorcery/pull/... | {'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-07T21:16:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rjvg-q57v-mjjc | 2021-08-25T21:05:59Z | 2020-05-06T19:51:02Z | null | ['CVE-2019-12398'] | XSS in Apache Airflow | In Apache Airflow before 1.10.5 when running with the "classic" UI, a malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. The new "RBAC" UI is unaffected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12398'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/blob/1.10.5/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72487ad6b23d1868989696278... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-06T19:50:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cxvr-r92m-q9hw | 2021-08-25T21:14:11Z | 2020-05-21T21:08:47Z | null | ['CVE-2020-13094'] | XSS in Dolibarr | Dolibarr before 11.0.4 allows XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13094'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr/'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/blob/11.0.4/ChangeLog'}, {'type': 'WEB', 'url': 'https://www.dolibarr.org/dolibarr-erp-crm-11-0-4-maintenance... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-21T17:29:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4w97-57v2-3w44 | 2021-01-08T20:17:36Z | 2020-05-12T00:45:24Z | null | ['CVE-2020-11072'] | False-negative validation results in MINT transactions with invalid baton | ### Impact
Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'slp-validate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-4w97-57v2-3w44'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-4w97-57v2-3w44'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11072'}, {'type': 'WE... | {'cwe_ids': ['CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-12T00:45:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qfcv-5whw-7pcw | 2021-10-08T19:56:28Z | 2020-05-27T21:09:15Z | null | ['CVE-2020-11059'] | Exposure of Sensitive Information to an Unauthorized Actor in AEgir | ### Impact
`aegir publish` and `aegir build` may leak secrets from environmental variables in the browser bundle published to npm.
### Patches
The code has been patched, users should upgrade to >= 21.10.1
### Workarounds
Run `printenv` to check your environment variables and revoke any secrets.
### For more informat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'aegir'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '21.7.0'}, {'fixed': '21.10.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ipfs/aegir/security/advisories/GHSA-qfcv-5whw-7pcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11059'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/aegir'}] | {'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-27T21:08:38Z', 'nvd_published_at': '2020-05-27T21:15:00Z'} |
1.4.0 | GHSA-2p68-f74v-9wc6 | 2023-08-08T16:28:29Z | 2020-05-26T14:49:24Z | null | ['CVE-2020-8165'] | ActiveSupport potentially unintended unmarshalling of user-provided objects in MemCacheStore and RedisCacheStore | In ActiveSupport, there is potentially unexpected behaviour in the MemCacheStore and RedisCacheStore where, when
untrusted user input is written to the cache store using the `raw: true` parameter, re-reading the result
from the cache can evaluate the user input as a Marshalled object instead of plain text. Vulnerable c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.2'}}, {'package': {'ecosystem': 'RubyGem... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8165'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/413388'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2020-8165.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-26T14:47:03Z', 'nvd_published_at': '2020-06-19T18:15:00Z'} |
1.4.0 | GHSA-qf7v-8hj3-4xw7 | 2023-09-05T17:54:19Z | 2020-05-06T19:41:29Z | null | ['CVE-2020-5390'] | Improper Verification of Cryptographic Signature in PySAML2 | PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5390'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e'}, {'type... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-06T19:39:39Z', 'nvd_published_at': '2020-01-13T19:15:00Z'} |
1.4.0 | GHSA-4j77-gg36-9864 | 2021-01-08T20:17:04Z | 2020-05-13T23:18:12Z | null | ['CVE-2020-11065'] | Cross-Site Scripting in TYPO3 CMS Link Handling | It has been discovered that link tags generated by `typolink` functionality are vulnerable to cross-site scripting - properties being assigned as HTML attributes have not been parsed correctly.
Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described.
### References
* https://typo3.org/security/adviso... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.5.12'}, {'fixed': '9.5.17'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.2.0'}, {'fixed': '10.4.2'}]}]... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4j77-gg36-9864'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11065'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T23:05:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rc77-xxq6-4mff | 2021-08-25T21:04:44Z | 2020-05-06T19:32:33Z | null | ['CVE-2020-6836'] | Command Injection in hot-formula-parser | Versions of `hot-formula-parser` prior to 3.0.1 are vulnerable to Command Injection. The package fails to sanitize values passed to the `parse` function and concatenates it in an `eval` call. If a value of the formula is supplied by user-controlled input it may allow attackers to run arbitrary commands in the server. ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hot-formula-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6836'}, {'type': 'WEB', 'url': 'https://github.com/handsontable/formula-parser/pull/58'}, {'type': 'WEB', 'url': 'https://github.com/handsontable/formula-parser/commit/396b089738d4bf30eb570a4fe6a188affa95cd5e'}, {'type': 'WEB', 'url': 'https://blog... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-06T19:32:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m8xj-5v73-3hh8 | 2021-08-25T21:07:36Z | 2020-05-13T16:29:43Z | null | ['CVE-2020-7646'] | curlrequest allows execution of arbitrary commands | curlrequest through 1.0.1 allows execution of arbitrary commands. It is possible to inject arbitrary commands by using a semicolon char in any of the `options` values. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'curlrequest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7646'}, {'type': 'PACKAGE', 'url': 'https://github.com/node-js-libs/curlrequest'}, {'type': 'WEB', 'url': 'https://github.com/node-js-libs/curlrequest/blob/master/index.js#L239,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CURLREQUEST-56... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-12T16:53:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c78w-2gw7-gjv3 | 2021-01-14T17:50:10Z | 2020-05-11T20:00:15Z | null | ['CVE-2019-1010091'] | XSS in TinyMCE | ### Impact
A cross-site scripting (XSS) vulnerability was discovered in: the core parser and `media` plugin. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.9 or lower... | [] | [{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-c78w-2gw7-gjv3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010091'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/issues/4394'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-11T20:00:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h79p-32mx-fjj9 | 2022-10-06T18:15:00Z | 2020-05-21T21:09:04Z | null | ['CVE-2020-11973'] | Apache Camel Netty enables Java deserialization by default | Apache Camel Netty enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-netty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11973'}, {'type': 'WEB', 'url': 'https://camel.apache.org/security/CVE-2020-11973.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WE... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-21T17:42:21Z', 'nvd_published_at': '2020-05-14T17:15:00Z'} |
1.4.0 | GHSA-2rxh-h6h9-qrqc | 2021-01-08T20:16:34Z | 2020-05-13T23:18:38Z | null | ['CVE-2020-11066'] | Class destructors causing side-effects when being unserialized in TYPO3 CMS | Calling unserialize() on malicious user-submitted content can result in the following scenarios:
- trigger deletion of arbitrary directory in file system (if writable for web server)
- trigger message submission via email using identity of web site (mail relay)
Another insecure deserialization vulnerability is require... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.17'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.2'}]}]}... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2rxh-h6h9-qrqc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11066'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T23:17:19Z', 'nvd_published_at': '2020-05-14T00:15:00Z'} |
1.4.0 | GHSA-27xj-rqx5-2255 | 2021-08-25T21:01:15Z | 2020-05-15T18:58:44Z | null | ['CVE-2020-11619'] | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11619'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2680'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:32:22Z', 'nvd_published_at': '2020-04-07T23:15:00Z'} |
1.4.0 | GHSA-wh69-wc6q-7888 | 2021-11-04T17:08:10Z | 2020-05-28T18:42:59Z | null | ['CVE-2020-11079'] | Command injection in node-dns-sync | dns-sync through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'dns-sync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/security/advisories/GHSA-wh69-wc6q-7888'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11079'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/commit/cb10a5ac7913eacc031ade7d91596277f31645dc'}, {'type': 'PAC... | {'cwe_ids': ['CWE-77', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-28T18:42:31Z', 'nvd_published_at': '2020-05-28T19:15:00Z'} |
1.4.0 | GHSA-m42x-37p3-fv5w | 2023-07-05T19:19:29Z | 2020-05-26T15:09:48Z | null | ['CVE-2020-8162'] | Circumvention of file size limits in ActiveStorage | There is a vulnerability in ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user.
Versions Affected: rails < 5.2.4.2, rails < 6.0.3.1
Not affected: Applications that do not use the direct upload functionality of the ActiveStorage S3 adapter.
Fixed Versi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8162'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-ruby/issues/2098'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/789579'}, {'type': 'PACKAGE', 'url': 'https://github.com/aws/aws-sdk-ruby/'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-434', 'CWE-602'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-26T15:06:42Z', 'nvd_published_at': '2020-06-19T17:15:00Z'} |
1.4.0 | GHSA-qmqc-x3r4-6v39 | 2020-04-22T20:58:45Z | 2020-05-15T18:59:07Z | null | ['CVE-2019-14893'] | Polymorphic deserialization of malicious object in jackson-databind | A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using ... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14893'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2469'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317'}, {'type': 'WEB', 'url': 'https://a... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T20:58:45Z', 'nvd_published_at': '2020-03-02T21:15:00Z'} |
1.4.0 | GHSA-jc83-cpf9-q7c6 | 2021-01-08T20:17:31Z | 2020-05-12T00:39:03Z | null | ['CVE-2020-11071'] | False-negative validation results in MINT transactions with invalid baton | ### Impact
Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'slpjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-jc83-cpf9-q7c6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11071'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754'}] | {'cwe_ids': ['CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-12T00:26:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-347x-877p-hcwx | 2021-01-08T21:08:47Z | 2020-05-13T22:19:21Z | null | ['CVE-2020-11063'] | Information Disclosure in Password Reset | In TYPO3 CMS 10.4.0 through 10.4.1, it has been discovered that time-based attacks can be used with the password reset functionality for backend users. This allows an attacker to mount user enumeration based on email addresses assigned to backend user accounts.
This has been fixed in 10.4.2.
### References
* https://... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.4.0'}, {'fixed': '10.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-347x-877p-hcwx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11063'}] | {'cwe_ids': ['CWE-204'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T22:16:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-59cf-m7v5-wh5w | 2021-01-08T20:16:29Z | 2020-05-13T22:17:34Z | null | ['CVE-2020-11070'] | Cross-Site Scripting in SVG Sanitizer | Slightly invalid or incomplete SVG markup is not correctly processed and thus not sanitized at all. Albeit the markup is not valid it still is evaluated in browsers and leads to cross-site scripting.
An updated version 1.0.3 is available from the TYPo3 extension manager and at https://extensions.typo3.org/extension/do... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 't3g/svg-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3GmbH/svg_sanitizer/security/advisories/GHSA-59cf-m7v5-wh5w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11070'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T18:39:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cf6r-3wgc-h863 | 2023-09-14T15:07:13Z | 2020-05-15T18:58:58Z | null | ['CVE-2019-14892'] | Polymorphic deserialization of malicious object in jackson-databind | A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5, and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.7.2'}}, {'package':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14892'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2462'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-200', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:29:41Z', 'nvd_published_at': '2020-03-02T17:15:00Z'} |
1.4.0 | GHSA-px8v-hxxx-2rgh | 2021-10-27T17:00:42Z | 2020-05-08T21:00:02Z | null | ['CVE-2020-11056'] | Potential Code Injection in Sprout Forms | ### Impact
A potential Server-Side Template Injection vulnerability exists in Sprout Forms which could lead to the execution of Twig code.
### Patches
The problem is fixed in`barrelstrength/sprout-forms:v3.9.0` which upgrades to `barrelstrength/sprout-base-email:v1.2.7`
### Workarounds
Users unable to upgrade shou... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'barrelstrength/sprout-base-email'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'barrelstrength/sprout-forms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'... | [{'type': 'WEB', 'url': 'https://github.com/barrelstrength/craft-sprout-forms/security/advisories/GHSA-px8v-hxxx-2rgh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11056'}, {'type': 'WEB', 'url': 'https://github.com/barrelstrength/craft-sprout-base-email/commit/5ef759f4713ede6dbf77c9d9df9f99... | {'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-08T19:12:33Z', 'nvd_published_at': '2020-05-07T21:15:00Z'} |
1.4.0 | GHSA-42f2-f9vc-6365 | 2021-06-15T17:26:32Z | 2020-05-22T19:23:04Z | null | ['CVE-2019-12423'] | Private key leak in Apache CXF | Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12423'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d... | {'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-22T19:22:30Z', 'nvd_published_at': '2020-01-16T18:15:00Z'} |
1.4.0 | GHSA-5vf7-q87h-pg6w | 2021-01-08T20:20:35Z | 2020-05-07T21:10:26Z | null | ['CVE-2020-11055'] | Cross-Site Scripting in BookStack | ### Impact
A user with permission to create comments could POST HTML directly to the system to be saved in a comment, which would then be executed/displayed to others users viewing the comment. Through this vulnerability custom JavaScript code could be injected and therefore ran on other user machines.
This most impa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.29.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/security/advisories/GHSA-5vf7-q87h-pg6w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11055'}, {'type': 'WEB', 'url': 'https://bookstackapp.com/blog/beta-release-v0-29-2/'}, {'type': 'WEB', 'url': 'https://github.com/BookStac... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-07T18:36:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-43gj-mj2w-wh46 | 2021-01-08T20:16:50Z | 2020-05-13T23:17:48Z | null | ['CVE-2020-11064'] | Cross-Site Scripting in TYPO3 CMS Form Engine | In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.17 and greater than or equal to 10.0.0 and less than 10.4.2, it has been discovered that HTML `placeholder` attributes containing data of other database records are vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.17'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.2'}]}]}... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-43gj-mj2w-wh46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11064'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T22:54:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9vvp-fxw6-jcxr | 2021-08-25T21:00:41Z | 2020-05-15T18:58:47Z | null | ['CVE-2020-11113'] | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11113'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2670'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:31:52Z', 'nvd_published_at': '2020-03-31T05:15:00Z'} |
1.4.0 | GHSA-mg5p-95m9-rmfp | 2021-07-26T21:16:26Z | 2020-05-13T16:28:46Z | null | ['CVE-2020-8159'] | Arbitrary file write in actionpack-page_caching gem | There is a vulnerability in actionpack_page-caching gem < v1.2.1 that allows an attacker to write arbitrary files to a web server, potentially resulting in remote code execution if the attacker can write unescaped ERB to a view. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack-page_caching'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8159'}, {'type': 'WEB', 'url': 'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/CFRVkEytdP8'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T16:28:30Z', 'nvd_published_at': '2020-05-12T13:15:00Z'} |
1.4.0 | GHSA-344f-f5vg-2jfj | 2022-02-08T22:05:47Z | 2020-05-21T18:52:29Z | null | ['CVE-2020-9484'] | Potential remote code execution in Apache Tomcat | When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configur... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.0-M5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0-M4'}}, {'package... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9484'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222.patch'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-21T17:21:20Z', 'nvd_published_at': '2020-05-20T19:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.