schema_version string | id string | modified timestamp[s] | published timestamp[s] | aliases list | summary string | details string | severity list | affected list | references list | database_specific dict |
|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-m4fv-gm5m-4725 | 2023-04-10T16:25:41 | 2023-03-01T17:58:01 | [
"CVE-2022-1274"
] | HTML Injection in Keycloak Admin REST API | The `execute-actions-email` endpoint of the Keycloak Admin REST API allows a malicious actor to send emails containing phishing links to Keycloak users.
| [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.keycloak:keycloak-services"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fix... | [
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274"
},
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/pull/16764"
},
{
"type": "W... | {
"cwe_ids": [
"CWE-79",
"CWE-80"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2023-03-01T17:58:01",
"nvd_published_at": "2023-03-29T21:15:00"
} |
1.4.0 | GHSA-8vhq-qq4p-grq3 | 2022-07-01T21:47:32 | 2022-05-13T01:11:53 | [
"CVE-2017-1000487"
] | OS Command Injection in Plexus-utils | Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.codehaus.plexus:plexus-utils"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"f... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000487"
},
{
"type": "WEB",
"url": "https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1322"
... | {
"cwe_ids": [
"CWE-78"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2022-07-01T21:47:32",
"nvd_published_at": "2018-01-03T20:29:00"
} |
1.4.0 | GHSA-w3x5-427h-wfq6 | 2022-12-09T20:19:32 | 2022-12-09T20:19:32 | [
"CVE-2022-46166"
] | Spring Boot Admins integrated notifier support allows arbitrary code execution | ### Impact
All users who run Spring Boot Admin Server, having enabled Notifiers (e.g. Teams-Notifier) and write access to environment variables via UI are possibly affected.
### Patches
In the most recent releases of Spring Boot Admin 2.6.10 and 2.7.8 the issue is fixed by implementing `SimpleExecutionContext` of SpEL... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "de.codecentric:spring-boot-admin"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"f... | [
{
"type": "WEB",
"url": "https://github.com/codecentric/spring-boot-admin/security/advisories/GHSA-w3x5-427h-wfq6"
},
{
"type": "PACKAGE",
"url": "https://github.com/codecentric/spring-boot-admin"
}
] | {
"cwe_ids": [
"CWE-94"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-12-09T20:19:32",
"nvd_published_at": "2022-12-09T21:15:00"
} |
1.4.0 | GHSA-4m9r-5gqp-7j82 | 2021-06-11T14:37:55 | 2018-10-19T16:52:06 | [
"CVE-2016-10726"
] | High severity vulnerability that affects org.dspace:dspace-xmlui | The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.dspace:dspace-xmlui"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "4.0",
"fixed": null
},
{
"introduced": null,
"fixed": ... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10726"
},
{
"type": "WEB",
"url": "https://github.com/DSpace/DSpace/releases/tag/dspace-5.5"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-4m9r-5gqp-7j82"
},
{
"type": "WEB",
"ur... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T20:58:34",
"nvd_published_at": null
} |
1.4.0 | GHSA-mjmq-gwgm-5qhm | 2023-12-07T18:20:03 | 2023-07-10T18:30:49 | [
"CVE-2023-35887"
] | Apache MINA SSHD information disclosure vulnerability | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA.
In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover "exists/does not exist" information about items outside the rooted tree via paths incl... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.sshd:sshd-common"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.1.0",
"fixed": null
},
{
"introduced": null,
"fi... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35887"
},
{
"type": "WEB",
"url": "https://github.com/apache/mina-sshd/pull/362"
},
{
"type": "WEB",
"url": "https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0"
},
{
"type... | {
"cwe_ids": [
"CWE-200",
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2023-07-10T21:53:01",
"nvd_published_at": "2023-07-10T16:15:53"
} |
1.4.0 | GHSA-cvx5-m8vg-vxgc | 2022-04-28T21:16:40 | 2022-04-28T21:16:40 | [
"CVE-2022-24897"
] | Arbitrary filesystem write access from velocity. | ### Impact
The velocity scripts is not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Now writing an attacking script in velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File.
... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.commons:xwiki-commons-velocity"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.3.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24897"
},
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/pull/127"
},
{
"type":... | {
"cwe_ids": [
"CWE-22",
"CWE-668"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-04-28T21:16:40",
"nvd_published_at": "2022-05-02T22:15:00"
} |
1.4.0 | GHSA-jc7h-c423-mpjc | 2024-01-22T21:32:36 | 2024-01-15T12:30:19 | [
"CVE-2023-46749"
] | Apache Shiro vulnerable to path traversal | Apache Shiro before 1.130 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting
Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default).
| [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.shiro:shiro-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed"... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46749"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/mdv7ftz7k4488rzloxo2fb0p9shnp9wm"
}
] | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2024-01-16T20:34:50",
"nvd_published_at": "2024-01-15T10:15:26"
} |
1.4.0 | GHSA-7wfc-x4f7-gg2x | 2022-03-18T17:58:01 | 2022-03-18T17:58:01 | [
"CVE-2021-30180"
] | Code injection in Apache Dubbo | Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.dubbo:dubbo"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.7.0",
"fixed": null
},
{
"introduced": null,
"fixed":... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30180"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/raed526465e56204030ddf374b1959478a290e7511971d7aba2e9e39b%40%3Cdev.dubbo.apache.org%3E"
}
] | {
"cwe_ids": [
"CWE-444",
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2021-06-02T20:19:48",
"nvd_published_at": "2021-06-01T14:15:00"
} |
1.4.0 | GHSA-395w-qhqr-9fr6 | 2021-01-06T20:01:15 | 2021-01-06T20:01:34 | [
"CVE-2020-17519"
] | Path Traversal in Apache Flink | A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1... | [] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.flink:flink-runtime_2.11"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.11.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17519"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r0a433be10676f4fe97ca423d08f914e0ead341c901216f292d2bbe83@%3Cissues.flink.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.or... | {
"cwe_ids": [
"CWE-22",
"CWE-552"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2021-01-06T20:01:15",
"nvd_published_at": "2021-01-05T12:15:00"
} |
1.4.0 | GHSA-rhq2-2574-78mc | 2022-04-27T14:42:53 | 2018-10-17T19:54:53 | [
"CVE-2018-17297"
] | Unzip function in ZipUtil.java in Hutool allows remote attackers to overwrite arbitrary files via directory traversal | The unzip function in ZipUtil.java in Hutool before 4.1.12 allows remote attackers to overwrite arbitrary files via directory traversal sequences in a filename within a ZIP archive. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "cn.hutool:hutool-parent"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "4... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17297"
},
{
"type": "WEB",
"url": "https://github.com/looly/hutool/issues/162"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-rhq2-2574-78mc"
},
{
"type": "PACKAGE",
"url": "https... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:55:00",
"nvd_published_at": null
} |
1.4.0 | GHSA-h2rq-qhr7-53gm | 2024-02-14T14:52:14 | 2024-02-06T12:30:30 | [
"CVE-2024-23673"
] | Apache Sling Servlets Resolver executes malicious code via path traversal |
Malicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system.
If the system is vulnerable, ... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.sling:org.apache.sling.servlets.resolver"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": n... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23673"
},
{
"type": "WEB",
"url": "https://github.com/apache/sling-org-apache-sling-servlets-resolver/commit/b54d4e6693e0bcd63a97a0328f4f065b8a81b75e"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/sli... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2024-02-06T18:24:31",
"nvd_published_at": "2024-02-06T10:15:08"
} |
1.4.0 | GHSA-gpq8-963w-8qc9 | 2023-07-20T14:54:54 | 2023-07-12T12:31:36 | [
"CVE-2023-37582"
] | RocketMQ NameServer component Code Injection vulnerability | The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1.
When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration ... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.rocketmq:rocketmq-namesrv"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37582"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/rocketmq"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/m614czxtpvlztd7mfgcs2xcsg36rdbnc"
},
{
"type": "WEB",
"url": "htt... | {
"cwe_ids": [
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-07-12T17:30:39",
"nvd_published_at": "2023-07-12T10:15:11"
} |
1.4.0 | GHSA-c28r-hw5m-5gv3 | 2022-08-05T00:22:25 | 2022-07-15T20:44:55 | [
"CVE-2022-31159"
] | Partial Path Traversal in com.amazonaws:aws-java-sdk-s3 | ### Overview
A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downl... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.amazonaws:aws-java-sdk-s3"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixe... | [
{
"type": "WEB",
"url": "https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31159"
},
{
"type": "WEB",
"url": "https://github.com/aws/aws-sdk-java/commit/cb66c50c885566d9a7fce837a68dc... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-07-15T20:44:55",
"nvd_published_at": "2022-07-15T18:15:00"
} |
1.4.0 | GHSA-hcwx-7q5v-vc67 | 2022-11-01T22:37:41 | 2022-05-14T03:12:09 | [
"CVE-2018-12036"
] | Path Traversal in OWASP Dependency-Check | OWASP Dependency-Check before 3.2.0 allows attackers to write to arbitrary files via a crafted archive that holds directory traversal filenames. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.owasp:dependency-check-maven"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"f... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12036"
},
{
"type": "PACKAGE",
"url": "https://github.com/jeremylong/DependencyCheck"
},
{
"type": "WEB",
"url": "https://github.com/jeremylong/DependencyCheck/blob/master/RELEASE_NOTES.md#version-320-2018-05-21"... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-11-01T22:37:41",
"nvd_published_at": "2018-06-07T18:29:00"
} |
1.4.0 | GHSA-gwxv-jv83-6qjr | 2023-06-06T00:45:18 | 2023-06-06T00:45:18 | [
"CVE-2023-33962"
] | JStachio XSS vulnerability: Unescaped single quotes | ### Impact
#### Description:
JStachio fails to escape single quotes `'` in HTML, allowing an attacker to inject malicious code.
#### Reproduction Steps:
Use the following template code:
```html
<div attr='{{value}}'></div>
```
Set the value variable to `' onblur='alert(1)`.
```java
public class Escaping {
publ... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "io.jstach:jstachio"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "1.0.1"... | [
{
"type": "WEB",
"url": "https://github.com/jstachio/jstachio/security/advisories/GHSA-gwxv-jv83-6qjr"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33962"
},
{
"type": "WEB",
"url": "https://github.com/jstachio/jstachio/issues/157"
},
{
"type": "... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2023-06-06T00:45:18",
"nvd_published_at": "2023-05-30T22:15:10"
} |
1.4.0 | GHSA-32xf-jwmv-9hf3 | 2022-09-21T19:31:46 | 2020-06-05T16:13:20 | [
"CVE-2020-5410"
] | Directory traversal attack in Spring Cloud Config | Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a di... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.springframework.cloud:spring-cloud-config-server"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.1.0",
"fixed": null
},
{
"introduce... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5410"
},
{
"type": "PACKAGE",
"url": "https://github.com/spring-cloud/spring-cloud-config"
},
{
"type": "WEB",
"url": "https://tanzu.vmware.com/security/cve-2020-5410"
}
] | {
"cwe_ids": [
"CWE-22",
"CWE-23"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2020-06-04T19:07:50",
"nvd_published_at": "2020-06-02T17:15:00"
} |
1.4.0 | GHSA-mw36-7c6c-q4q2 | 2022-02-08T22:03:00 | 2020-11-16T20:07:59 | [
"CVE-2020-26217"
] | XStream can be used for Remote Code Execution | ### Impact
The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14.... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.thoughtworks.xstream:xstream"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"f... | [
{
"type": "WEB",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26217"
},
{
"type": "WEB",
"url": "https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d... | {
"cwe_ids": [
"CWE-78"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2020-11-16T20:06:06",
"nvd_published_at": "2020-11-16T21:15:00"
} |
1.4.0 | GHSA-pv7v-ph6g-3gxv | 2023-05-09T19:59:31 | 2023-05-09T19:59:31 | [
"CVE-2023-31126"
] | Improper Neutralization of Invalid Characters in Data Attribute Names in org.xwiki.commons:xwiki-commons-xml | ### Impact
The HTML sanitizer, introduced in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid data attributes. This can be exploited, e.g., via the link syntax in any content that supports XWiki syntax like comments in XWiki:
```
[[Link1>>https://XWiki.example.... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.commons:xwiki-commons-xml"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "14.6-rc-1",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-pv7v-ph6g-3gxv"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-31126"
},
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/commit/0b8e9c45b7e7457043938f3... | {
"cwe_ids": [
"CWE-79",
"CWE-86"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-05-09T19:59:31",
"nvd_published_at": "2023-05-09T13:15:18"
} |
1.4.0 | GHSA-f554-x222-wgf7 | 2024-03-04T23:51:42 | 2019-05-29T18:05:03 | [
"CVE-2013-7285"
] | Command Injection in Xstream | Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.thoughtworks.xstream:xstream"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"f... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7285"
},
{
"type": "WEB",
"url": "https://github.com/x-stream/xstream/commit/6344867dce6767af7d0fe34fb393271a6456672d"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18... | {
"cwe_ids": [
"CWE-77",
"CWE-78"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2019-05-15T23:13:58",
"nvd_published_at": "2019-05-15T17:29:00"
} |
1.4.0 | GHSA-p9j6-4pjr-gp48 | 2022-08-11T16:59:22 | 2020-12-18T18:28:23 | [
"CVE-2020-35460"
] | MPXJ path Traversal vulnerability | common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "net.sf.mpxj:mpxj"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "8.3.5"
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35460"
},
{
"type": "WEB",
"url": "https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2020-12-17T23:15:51",
"nvd_published_at": "2020-12-14T23:15:00"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.