schema_version
string
id
string
modified
timestamp[s]
published
timestamp[s]
aliases
list
summary
string
details
string
severity
list
affected
list
references
list
database_specific
dict
1.4.0
GHSA-m4fv-gm5m-4725
2023-04-10T16:25:41
2023-03-01T17:58:01
[ "CVE-2022-1274" ]
HTML Injection in Keycloak Admin REST API
The `execute-actions-email` endpoint of the Keycloak Admin REST API allows a malicious actor to send emails containing phishing links to Keycloak users.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.keycloak:keycloak-services" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fix...
[ { "type": "WEB", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274" }, { "type": "WEB", "url": "https://github.com/keycloak/keycloak/pull/16764" }, { "type": "W...
{ "cwe_ids": [ "CWE-79", "CWE-80" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-03-01T17:58:01", "nvd_published_at": "2023-03-29T21:15:00" }
1.4.0
GHSA-8vhq-qq4p-grq3
2022-07-01T21:47:32
2022-05-13T01:11:53
[ "CVE-2017-1000487" ]
OS Command Injection in Plexus-utils
Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.codehaus.plexus:plexus-utils" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "f...
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000487" }, { "type": "WEB", "url": "https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1322" ...
{ "cwe_ids": [ "CWE-78" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2022-07-01T21:47:32", "nvd_published_at": "2018-01-03T20:29:00" }
1.4.0
GHSA-w3x5-427h-wfq6
2022-12-09T20:19:32
2022-12-09T20:19:32
[ "CVE-2022-46166" ]
Spring Boot Admins integrated notifier support allows arbitrary code execution
### Impact All users who run Spring Boot Admin Server, having enabled Notifiers (e.g. Teams-Notifier) and write access to environment variables via UI are possibly affected. ### Patches In the most recent releases of Spring Boot Admin 2.6.10 and 2.7.8 the issue is fixed by implementing `SimpleExecutionContext` of SpEL...
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "de.codecentric:spring-boot-admin" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "f...
[ { "type": "WEB", "url": "https://github.com/codecentric/spring-boot-admin/security/advisories/GHSA-w3x5-427h-wfq6" }, { "type": "PACKAGE", "url": "https://github.com/codecentric/spring-boot-admin" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-12-09T20:19:32", "nvd_published_at": "2022-12-09T21:15:00" }
1.4.0
GHSA-4m9r-5gqp-7j82
2021-06-11T14:37:55
2018-10-19T16:52:06
[ "CVE-2016-10726" ]
High severity vulnerability that affects org.dspace:dspace-xmlui
The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.dspace:dspace-xmlui" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "4.0", "fixed": null }, { "introduced": null, "fixed": ...
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10726" }, { "type": "WEB", "url": "https://github.com/DSpace/DSpace/releases/tag/dspace-5.5" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-4m9r-5gqp-7j82" }, { "type": "WEB", "ur...
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-16T20:58:34", "nvd_published_at": null }
1.4.0
GHSA-mjmq-gwgm-5qhm
2023-12-07T18:20:03
2023-07-10T18:30:49
[ "CVE-2023-35887" ]
Apache MINA SSHD information disclosure vulnerability
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA. In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover "exists/does not exist" information about items outside the rooted tree via paths incl...
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.sshd:sshd-common" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.1.0", "fixed": null }, { "introduced": null, "fi...
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35887" }, { "type": "WEB", "url": "https://github.com/apache/mina-sshd/pull/362" }, { "type": "WEB", "url": "https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0" }, { "type...
{ "cwe_ids": [ "CWE-200", "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-07-10T21:53:01", "nvd_published_at": "2023-07-10T16:15:53" }
1.4.0
GHSA-cvx5-m8vg-vxgc
2022-04-28T21:16:40
2022-04-28T21:16:40
[ "CVE-2022-24897" ]
Arbitrary filesystem write access from velocity.
### Impact The velocity scripts is not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Now writing an attacking script in velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File. ...
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.xwiki.commons:xwiki-commons-velocity" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.3.0", "fixed": null }, { "introduced": null, ...
[ { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24897" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/pull/127" }, { "type":...
{ "cwe_ids": [ "CWE-22", "CWE-668" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-04-28T21:16:40", "nvd_published_at": "2022-05-02T22:15:00" }
1.4.0
GHSA-jc7h-c423-mpjc
2024-01-22T21:32:36
2024-01-15T12:30:19
[ "CVE-2023-46749" ]
Apache Shiro vulnerable to path traversal
Apache Shiro before 1.130 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default).
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.shiro:shiro-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed"...
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46749" }, { "type": "WEB", "url": "https://lists.apache.org/thread/mdv7ftz7k4488rzloxo2fb0p9shnp9wm" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-01-16T20:34:50", "nvd_published_at": "2024-01-15T10:15:26" }
1.4.0
GHSA-7wfc-x4f7-gg2x
2022-03-18T17:58:01
2022-03-18T17:58:01
[ "CVE-2021-30180" ]
Code injection in Apache Dubbo
Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.dubbo:dubbo" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.7.0", "fixed": null }, { "introduced": null, "fixed":...
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30180" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/raed526465e56204030ddf374b1959478a290e7511971d7aba2e9e39b%40%3Cdev.dubbo.apache.org%3E" } ]
{ "cwe_ids": [ "CWE-444", "CWE-94" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-06-02T20:19:48", "nvd_published_at": "2021-06-01T14:15:00" }
1.4.0
GHSA-395w-qhqr-9fr6
2021-01-06T20:01:15
2021-01-06T20:01:34
[ "CVE-2020-17519" ]
Path Traversal in Apache Flink
A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1...
[]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.flink:flink-runtime_2.11" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.11.0", "fixed": null }, { "introduced": null, ...
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17519" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r0a433be10676f4fe97ca423d08f914e0ead341c901216f292d2bbe83@%3Cissues.flink.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.or...
{ "cwe_ids": [ "CWE-22", "CWE-552" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-01-06T20:01:15", "nvd_published_at": "2021-01-05T12:15:00" }
1.4.0
GHSA-rhq2-2574-78mc
2022-04-27T14:42:53
2018-10-17T19:54:53
[ "CVE-2018-17297" ]
Unzip function in ZipUtil.java in Hutool allows remote attackers to overwrite arbitrary files via directory traversal
The unzip function in ZipUtil.java in Hutool before 4.1.12 allows remote attackers to overwrite arbitrary files via directory traversal sequences in a filename within a ZIP archive.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "cn.hutool:hutool-parent" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "4...
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17297" }, { "type": "WEB", "url": "https://github.com/looly/hutool/issues/162" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-rhq2-2574-78mc" }, { "type": "PACKAGE", "url": "https...
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:55:00", "nvd_published_at": null }
1.4.0
GHSA-h2rq-qhr7-53gm
2024-02-14T14:52:14
2024-02-06T12:30:30
[ "CVE-2024-23673" ]
Apache Sling Servlets Resolver executes malicious code via path traversal
Malicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system. If the system is vulnerable, ...
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.sling:org.apache.sling.servlets.resolver" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": n...
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23673" }, { "type": "WEB", "url": "https://github.com/apache/sling-org-apache-sling-servlets-resolver/commit/b54d4e6693e0bcd63a97a0328f4f065b8a81b75e" }, { "type": "PACKAGE", "url": "https://github.com/apache/sli...
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-02-06T18:24:31", "nvd_published_at": "2024-02-06T10:15:08" }
1.4.0
GHSA-gpq8-963w-8qc9
2023-07-20T14:54:54
2023-07-12T12:31:36
[ "CVE-2023-37582" ]
RocketMQ NameServer component Code Injection vulnerability
The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration ...
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.rocketmq:rocketmq-namesrv" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, ...
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37582" }, { "type": "PACKAGE", "url": "https://github.com/apache/rocketmq" }, { "type": "WEB", "url": "https://lists.apache.org/thread/m614czxtpvlztd7mfgcs2xcsg36rdbnc" }, { "type": "WEB", "url": "htt...
{ "cwe_ids": [ "CWE-94" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-07-12T17:30:39", "nvd_published_at": "2023-07-12T10:15:11" }
1.4.0
GHSA-c28r-hw5m-5gv3
2022-08-05T00:22:25
2022-07-15T20:44:55
[ "CVE-2022-31159" ]
Partial Path Traversal in com.amazonaws:aws-java-sdk-s3
### Overview A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downl...
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.amazonaws:aws-java-sdk-s3" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixe...
[ { "type": "WEB", "url": "https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31159" }, { "type": "WEB", "url": "https://github.com/aws/aws-sdk-java/commit/cb66c50c885566d9a7fce837a68dc...
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-07-15T20:44:55", "nvd_published_at": "2022-07-15T18:15:00" }
1.4.0
GHSA-hcwx-7q5v-vc67
2022-11-01T22:37:41
2022-05-14T03:12:09
[ "CVE-2018-12036" ]
Path Traversal in OWASP Dependency-Check
OWASP Dependency-Check before 3.2.0 allows attackers to write to arbitrary files via a crafted archive that holds directory traversal filenames.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.owasp:dependency-check-maven" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "f...
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12036" }, { "type": "PACKAGE", "url": "https://github.com/jeremylong/DependencyCheck" }, { "type": "WEB", "url": "https://github.com/jeremylong/DependencyCheck/blob/master/RELEASE_NOTES.md#version-320-2018-05-21"...
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-11-01T22:37:41", "nvd_published_at": "2018-06-07T18:29:00" }
1.4.0
GHSA-gwxv-jv83-6qjr
2023-06-06T00:45:18
2023-06-06T00:45:18
[ "CVE-2023-33962" ]
JStachio XSS vulnerability: Unescaped single quotes
### Impact #### Description: JStachio fails to escape single quotes `'` in HTML, allowing an attacker to inject malicious code. #### Reproduction Steps: Use the following template code: ```html <div attr='{{value}}'></div> ``` Set the value variable to `' onblur='alert(1)`. ```java public class Escaping { publ...
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "io.jstach:jstachio" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.0.1"...
[ { "type": "WEB", "url": "https://github.com/jstachio/jstachio/security/advisories/GHSA-gwxv-jv83-6qjr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33962" }, { "type": "WEB", "url": "https://github.com/jstachio/jstachio/issues/157" }, { "type": "...
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-06-06T00:45:18", "nvd_published_at": "2023-05-30T22:15:10" }
1.4.0
GHSA-32xf-jwmv-9hf3
2022-09-21T19:31:46
2020-06-05T16:13:20
[ "CVE-2020-5410" ]
Directory traversal attack in Spring Cloud Config
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a di...
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.springframework.cloud:spring-cloud-config-server" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.1.0", "fixed": null }, { "introduce...
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5410" }, { "type": "PACKAGE", "url": "https://github.com/spring-cloud/spring-cloud-config" }, { "type": "WEB", "url": "https://tanzu.vmware.com/security/cve-2020-5410" } ]
{ "cwe_ids": [ "CWE-22", "CWE-23" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-04T19:07:50", "nvd_published_at": "2020-06-02T17:15:00" }
1.4.0
GHSA-mw36-7c6c-q4q2
2022-02-08T22:03:00
2020-11-16T20:07:59
[ "CVE-2020-26217" ]
XStream can be used for Remote Code Execution
### Impact The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14....
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.thoughtworks.xstream:xstream" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "f...
[ { "type": "WEB", "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26217" }, { "type": "WEB", "url": "https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d...
{ "cwe_ids": [ "CWE-78" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-11-16T20:06:06", "nvd_published_at": "2020-11-16T21:15:00" }
1.4.0
GHSA-pv7v-ph6g-3gxv
2023-05-09T19:59:31
2023-05-09T19:59:31
[ "CVE-2023-31126" ]
Improper Neutralization of Invalid Characters in Data Attribute Names in org.xwiki.commons:xwiki-commons-xml
### Impact The HTML sanitizer, introduced in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid data attributes. This can be exploited, e.g., via the link syntax in any content that supports XWiki syntax like comments in XWiki: ``` [[Link1>>https://XWiki.example....
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.xwiki.commons:xwiki-commons-xml" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "14.6-rc-1", "fixed": null }, { "introduced": null, ...
[ { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-pv7v-ph6g-3gxv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-31126" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/commit/0b8e9c45b7e7457043938f3...
{ "cwe_ids": [ "CWE-79", "CWE-86" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-05-09T19:59:31", "nvd_published_at": "2023-05-09T13:15:18" }
1.4.0
GHSA-f554-x222-wgf7
2024-03-04T23:51:42
2019-05-29T18:05:03
[ "CVE-2013-7285" ]
Command Injection in Xstream
Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.thoughtworks.xstream:xstream" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "f...
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7285" }, { "type": "WEB", "url": "https://github.com/x-stream/xstream/commit/6344867dce6767af7d0fe34fb393271a6456672d" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18...
{ "cwe_ids": [ "CWE-77", "CWE-78" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2019-05-15T23:13:58", "nvd_published_at": "2019-05-15T17:29:00" }
1.4.0
GHSA-p9j6-4pjr-gp48
2022-08-11T16:59:22
2020-12-18T18:28:23
[ "CVE-2020-35460" ]
MPXJ path Traversal vulnerability
common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "net.sf.mpxj:mpxj" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "8.3.5" ...
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35460" }, { "type": "WEB", "url": "https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { ...
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-12-17T23:15:51", "nvd_published_at": "2020-12-14T23:15:00" }