schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringclasses 11
values | aliases
stringlengths 2
20
| summary
stringlengths 4
172
| details
stringlengths 47
3.95k
| severity
stringlengths 2
79
| affected
stringlengths 76
3.32k
| references
stringlengths 82
11.3k
| database_specific
stringlengths 131
190
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-hvmf-r92r-27hr | 2021-08-19T16:04:59Z | 2019-12-04T21:26:28Z | null | ['CVE-2019-19118'] | Django allows unintended model editing | Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19118'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/103ebe2b5ff1b2614b85a52c239f471904d26244'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/36f580a17f0b3cb087deadf3b65eea024f479c21'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/GjGqDvtNmWQ'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191217-0003/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/dec/02/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/02/1'}] | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-04T19:44:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v63x-xc9j-hhvq | 2021-07-28T16:43:29Z | 2019-12-11T02:01:44Z | null | ['CVE-2019-10769'] | Sandbox Breakout / Arbitrary Code Execution in safer-eval | All versions of `safer-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context and is not suited to process arbitrary user input. This may allow attackers to execute arbitrary code in the system.
## Recommendation
The package is not meant to receive user input. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'safer-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/commenthol/safer-eval/security/advisories/GHSA-v63x-xc9j-hhvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10769'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v63x-xc9j-hhvq'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SAFEREVAL-534901'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1428'}] | {'cwe_ids': ['CWE-20', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:57Z', 'nvd_published_at': '2019-12-06T23:15:00Z'} |
1.4.0 | GHSA-x92h-wmg2-6hp7 | 2021-08-19T15:18:27Z | 2019-12-02T18:10:24Z | null | ['CVE-2019-10913'] | Invalid HTTP method overrides allow possible XSS or other attacks in Symfony | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, HTTP Methods provided as verbs or using the override header may be treated as trusted input, but they are not validated, possibly causing SQL injection or XSS. This is related to symfony/http-foundation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10913'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10913.yaml'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-10913'}] | {'cwe_ids': ['CWE-79', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:49:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2mrj-435v-c2cr | 2020-06-16T20:41:51Z | 2019-12-02T18:15:31Z | 2020-06-16T20:15:24Z | [] | possible DoS caused by malformed signature decoding in Pure-Python ECDSA | **Withdrawn:** Duplicate of GHSA-pwfw-mgfj-7g3g. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14853'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14853'}, {'type': 'WEB', 'url': 'https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/33'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4588'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:15:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4328-8hgf-7wjr | 2022-08-11T00:00:45Z | 2019-12-13T15:39:32Z | null | ['CVE-2019-16777'] | npm Vulnerable to Global node_modules Binary Overwrite | Versions of the npm CLI prior to 6.13.4 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations.
For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This will not overwrite system binaries but only binaries put into the global node_modules directory.
This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
## Recommendation
Upgrade to version 6.13.4 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16777'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0573'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0579'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0597'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0602'}, {'type': 'WEB', 'url': 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4328-8hgf-7wjr'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/cli'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-48'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1437'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html'}] | {'cwe_ids': ['CWE-22', 'CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:02Z', 'nvd_published_at': '2019-12-13T01:15:00Z'} |
1.4.0 | GHSA-4mvc-qc5w-v5qr | 2023-09-20T19:22:55Z | 2019-12-17T22:53:34Z | null | ['CVE-2019-19712'] | Information disclosure in the Contao backend | ### Impact
Backend users can manipulate the details view URL to show pages and articles that have not been enabled for them.
### Patches
Update to Contao 4.4.46 or 4.8.6.
### Workarounds
None.
### References
https://contao.org/en/security-advisories/information-disclosure-in-the-back-end
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.46'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.8.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-4mvc-qc5w-v5qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19712'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19712.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}] | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T19:35:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q58g-455p-8vw9 | 2021-10-29T14:10:27Z | 2019-12-16T19:30:17Z | null | ['CVE-2019-16779'] | In RubyGem excon, interrupted Persistent Connections May Leak Response Data | ### Impact
There was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.
### Patches
The problem has been patched in 0.71.0, users should upgrade to this or a newer version (if one exists).
### Workarounds
Users can workaround the problem by disabling persistent connections, though this may cause performance implications.
### References
See the [patch](https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29) for further details.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [excon/issues](https://github.com/excon/excon/issues)
* Email us at [[email protected]](mailto:[email protected]) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'excon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.71.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16779'}, {'type': 'WEB', 'url': 'https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29'}, {'type': 'PACKAGE', 'url': 'https://github.com/excon/excon'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/excon/CVE-2019-16779.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00015.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00062.html'}] | {'cwe_ids': ['CWE-362', 'CWE-664'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-16T19:28:10Z', 'nvd_published_at': '2019-12-16T20:15:00Z'} |
1.4.0 | GHSA-m6cx-g6qm-p2cx | 2021-10-21T21:16:09Z | 2019-12-13T15:39:19Z | null | ['CVE-2019-16775'] | Arbitrary File Write in npm | Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to create files on a user's system when the package is installed. It is only possible to affect files that the user running `npm install` has access to and it is not possible to over write files that already exist on disk.
This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
## Recommendation
Upgrade to version 6.13.3 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16775'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0573'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0579'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0597'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0602'}, {'type': 'WEB', 'url': 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m6cx-g6qm-p2cx'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/cli'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1434'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html'}] | {'cwe_ids': ['CWE-59', 'CWE-61'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:50Z', 'nvd_published_at': '2019-12-13T01:15:00Z'} |
1.4.0 | GHSA-rh46-3fgc-mvrf | 2021-08-19T16:05:30Z | 2019-12-04T21:25:28Z | null | ['CVE-2019-19507'] | Validation bypass is possible in Json Pattern Validator | In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jpv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19507'}, {'type': 'WEB', 'url': 'https://github.com/manvel-khnkoyan/jpv/issues/6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jpv'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-04T19:47:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qhrx-hcm6-pmrw | 2023-01-17T13:55:02Z | 2019-12-02T18:12:26Z | null | ['CVE-2019-11458'] | Unsafe deserialization in SmtpTransport in CakePHP | An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.15'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11458'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/CVE-2019-11458.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commits/master'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/releases'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T00:51:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-484f-743f-6jx2 | 2022-07-05T18:07:34Z | 2019-12-12T22:50:20Z | null | ['CVE-2019-16774'] | Object injection in cookie driver in phpfastcache | ### Impact
An possible object injection has been discovered in cookie driver prior 5.0.13 versions (of 5.x releases).
### Patches
The issue has been addressed by enforcing JSON conversion when deserializing
### Workarounds
If you can't fix it, use another driver such as "Files" (Filesystem)
### References
Fixing release: https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the issue tracker](https://github.com/PHPSocialNetwork/phpfastcache/issues)
* Email us at [[email protected]](mailto:[email protected])
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpfastcache/phpfastcache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.13'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-484f-743f-6jx2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16774'}, {'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/commit/c4527205cb7a402b595790c74310791f5b04a1a4'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache'}, {'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-484f-743f-6jx2'}] | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6xc2-mj39-q599 | 2022-08-02T15:09:07Z | 2019-12-02T18:20:41Z | null | ['CVE-2019-18818'] | Strapi allows unauthenticated attacker to reset admin password without valid reset token | Versions of `strapi` prior to 3.0.0-beta.17.5 are vulnerable to Privilege Escalation. The password reset routes allows an unauthenticated attacker to reset an admin's password without providing a valid password reset token.
## Recommendation
Upgrade to version 3.0.0-beta.17.5 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-beta.17.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.17.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18818'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/4443'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18818'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1311'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html'}] | {'cwe_ids': ['CWE-640'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:36:24Z', 'nvd_published_at': '2019-11-07T22:15:00Z'} |
1.4.0 | GHSA-x8qc-rrcw-4r46 | 2022-08-10T23:58:46Z | 2019-12-13T15:39:26Z | null | ['CVE-2019-16776'] | npm symlink reference outside of node_modules | Versions of the npm CLI prior to 6.13.3 are vulnerable to a symlink reference outside of node_modules. It is possible for packages to create symlinks to files outside of the`node_modules` folder through the `bin` field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user’s system when the package is installed. Only files accessible by the user running the `npm install` are affected.
This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
## Recommendation
Upgrade to version 6.13.3 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16776'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0573'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0579'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0597'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0602'}, {'type': 'WEB', 'url': 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x8qc-rrcw-4r46'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1436'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:49Z', 'nvd_published_at': '2019-12-13T01:15:00Z'} |
1.4.0 | GHSA-79gr-58r3-pwm3 | 2023-09-21T19:46:51Z | 2019-12-02T18:07:16Z | null | ['CVE-2019-18889'] | Symfony Unsafe Cache Serialization Could Enable RCE | An issue was discovered in Symfony 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. Serializing certain cache adapter interfaces could result in remote code injection. This is related to symfony/cache. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.4.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.4.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18889'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-18889.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18889.yaml'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v4.3.8'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-18889-forbid-serializing-abstractadapter-and-tagawareadapter-instances'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/symfony-4-3-8-released'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-18889'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:45:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-844w-j86r-4x2j | 2021-11-01T14:12:42Z | 2019-12-16T20:17:10Z | null | ['CVE-2019-16778'] | Heap buffer overflow in `UnsortedSegmentSum` in TensorFlow | ### Impact
A heap buffer overflow in `UnsortedSegmentSum` can be produced when the `Index` template argument is `int32`. In this case `data_size` and `num_segments` fields are truncated from `int64` to `int32` and can produce negative numbers, resulting in accessing out of bounds heap memory.
This is unlikely to be exploitable and was detected and fixed internally. We are making the security advisory only to notify users that it is better to update to TensorFlow 1.15 or 2.0 or later as these versions already have this fixed.
### Patches
Patched by db4f9717c41bccc3ce10099ab61996b246099892 and released in all official releases after 1.15 and 2.0.
### For more information
Please consult [`SECURITY.md`](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-844w-j86r-4x2j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16778'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-002.md'}] | {'cwe_ids': ['CWE-122', 'CWE-681'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-12-16T20:16:12Z', 'nvd_published_at': '2019-12-16T21:15:00Z'} |
1.4.0 | GHSA-hrqr-hxpp-chr3 | 2021-11-03T14:59:03Z | 2019-12-18T19:01:31Z | null | ['CVE-2019-16782'] | Possible Information Leak / Session Hijack Vulnerability in Rack | There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session.
The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.
### Impact
The session id stored in a cookie is the same id that is used when querying the backing session storage engine. Most storage mechanisms (for example a database) use some sort of indexing in order to speed up the lookup of that id. By carefully timing requests and session lookup failures, an attacker may be able to perform a timing attack to determine an existing session id and hijack that session.
## Releases
The 1.6.12 and 2.0.8 releases are available at the normal locations.
### Workarounds
There are no known workarounds.
### Patches
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 1-6-session-timing-attack.patch - Patch for 1.6 series
* 2-0-session-timing-attack.patch - Patch for 2.6 series
### Credits
Thanks Will Leinweber for reporting this! | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16782'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2019-16782.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/18/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/18/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/19/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/04/08/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/04/09/2'}] | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-18T19:01:07Z', 'nvd_published_at': '2019-12-18T20:15:00Z'} |
1.4.0 | GHSA-m5ff-3wj3-8ph4 | 2019-12-26T16:34:06Z | 2019-12-26T16:34:38Z | null | [] | HTTP Request Smuggling: Invalid whitespace characters in headers in Waitress | ### Impact
If a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling.
```
Content-Length: 10
Transfer-Encoding: [\x0b]chunked
```
For clarity:
```
0x0b == vertical tab
```
Would get parsed by Waitress as being a `chunked` request, but a front-end server would use the `Content-Length` instead as the `Transfer-Encoding` header is considered invalid due to containing invalid characters.
If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure.
### Patches
Please upgrade to Waitress 1.4.1 which fixes this issue with stricter HTTP field validation.
Waitress 1.4.1 due to this change has become much more strict in what is allowed in header values, while the maintainers don't believe that these changes will cause any issues, it may cause failures with non-conformist reverse proxies or clients, and it is highly recommend that users validate the changes in their environment and make sure it won't cause any unacceptable failures.
### Workarounds
You may enable additional protections on front-end servers, those that follow RFC7230 correctly would drop the request with a 400 Bad Request.
Waitress will now correctly responds to the request with a 400 Bad Request, and will drop the connection to avoid any potential HTTP pipelining issues.
### References
This was mentioned in https://portswigger.net/research/http-desync-attacks-what-happened-next and was specifically mentioned as being an issue in HAProxy which did not properly filter it in this article: https://nathandavison.com/blog/haproxy-http-request-smuggling
### Thanks
The Pylons Project would like to thank ZeddYu Lu for doing extended testing against Waitress 1.4.0 and bringing this to our attention!
### For more information
If you have any questions or comments about this advisory:
* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
* email the Pylons Security mailing list: [email protected] (if security related) | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.parse_header']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017'}] | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T16:34:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fpff-384j-vxq7 | 2021-08-19T15:10:08Z | 2019-12-02T18:05:13Z | null | ['CVE-2019-10763'] | Data leakage via SQL Injection in Pimcore | pimcore/pimcore before 6.3.0 is vulnerable to SQL Injection. An attacker with limited privileges (classes permission) can achieve a SQL injection that can lead in data leakage. The vulnerability can be exploited via 'id', 'storeId', 'pageSize' and 'tables' parameters, using a payload for trigger a time based or error based sql injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10763'}, {'type': 'WEB', 'url': 'https://blog.certimetergroup.com/it/articolo/security/sql_injection_in_pimcore_6.2.3'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-480391'}] | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:55:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6rmq-x2hv-vxpp | 2023-09-08T14:19:06Z | 2019-12-02T18:11:25Z | null | ['CVE-2019-6338'] | Drupal core third-party PEAR Archive_Tar library is vulnerable to Deserialization of Untrusted Data | In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; Drupal core uses the third-party PEAR Archive_Tar library. This library has released a security update which impacts some Drupal configurations. Refer to CVE-2018-1000888 for details | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.62.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.6.0'}, {'fixed': '8.6.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6338'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6338.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/02/msg00032.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4370'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2019-001'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106706'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T00:34:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4vpc-5jx4-cfqg | 2021-07-28T15:49:16Z | 2019-12-02T18:09:21Z | null | ['CVE-2019-18886'] | User enumeration leak using switch user functionality in Symfony | An issue was discovered in Symfony 4.2.0 to 4.2.11 and 4.3.0 to 4.3.7. The ability to enumerate users was possible due to different handling depending on whether the user existed when making unauthorized attempts to use the switch users functionality. This is related to symfony/security. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18886'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-18886.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18886.yaml'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v4.3.8'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-18886-prevent-user-enumeration-using-switch-user-functionality'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/symfony-4-3-8-released'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-18886'}] | {'cwe_ids': ['CWE-200', 'CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:47:26Z', 'nvd_published_at': '2019-11-21T18:15:00Z'} |
1.4.0 | GHSA-g2xc-35jw-c63p | 2022-04-25T23:07:24Z | 2019-12-20T23:04:18Z | null | ['CVE-2019-16786'] | HTTP Request Smuggling: Invalid Transfer-Encoding in Waitress | ### Impact
Waitress would parse the `Transfer-Encoding` header and only look for a single string value, if that value was not `chunked` it would fall through and use the `Content-Length` header instead.
According to the HTTP standard `Transfer-Encoding` should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with `chunked`.
Requests sent with:
```
Transfer-Encoding: gzip, chunked
```
Would incorrectly get ignored, and the request would use a `Content-Length` header instead to determine the body size of the HTTP message.
This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining.
### Patches
This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies.
Waitress will now return a 501 Not Implemented error if the `Transfer-Encoding` is not `chunked` or contains multiple elements. Waitress does not support any transfer codings such as `gzip` or `deflate`.
The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don't cause any changes in behavior.
### Workarounds
Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn't use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method).
### Issues/more security issues:
* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
* email the Pylons Security mailing list: [email protected] (if security related) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.received', 'waitress.parser.HTTPRequestParser.parse_header', 'waitress.parser.get_header_lines', 'waitress.receiver.ChunkedReceiver', 'waitress.receiver.ChunkedReceiver.received', 'waitress.utilities.find_double_newline', 'waitress.utilities.Error']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16786'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0720'}, {'type': 'WEB', 'url': 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}] | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-20T23:01:53Z', 'nvd_published_at': '2019-12-20T23:15:00Z'} |
1.4.0 | GHSA-h9rv-jmmf-4pgx | 2021-01-08T18:42:22Z | 2019-12-05T18:44:37Z | null | ['CVE-2019-16769'] | Cross-Site Scripting in serialize-javascript | Versions of `serialize-javascript` prior to 2.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications.
## Recommendation
Upgrade to version 2.1.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'serialize-javascript'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-h9rv-jmmf-4pgx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16769'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h9rv-jmmf-4pgx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1426'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6rjc-4pwr-3vp7 | 2021-08-19T15:34:42Z | 2019-12-02T18:14:30Z | null | ['CVE-2019-10771'] | Cross-Site Scripting in iobroker.web | Versions of `iobroker.web` prior to 2.4.10 are vulnerable to Cross-Site Scripting. The package fails to escape URL parameters that may be reflected in the server response. This can be used by attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 2.4.10 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'iobroker.web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10771'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IOBROKERWEB-534971'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1345'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:13:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9xcj-c8cr-8c3c | 2022-10-07T20:34:53Z | 2019-12-26T18:22:26Z | null | ['CVE-2019-17563'] | In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack | When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.99'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.50'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.30'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17563'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/43'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200107-0001/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4251-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4596'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html'}] | {'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T18:22:01Z', 'nvd_published_at': '2019-12-23T17:15:00Z'} |
1.4.0 | GHSA-4ppp-gpcr-7qf6 | 2022-03-24T17:52:19Z | 2019-12-20T23:04:35Z | null | [] | HTTP Request Smuggling: Content-Length Sent Twice in Waitress | ### Impact
Waitress would header fold a double `Content-Length` header and due to being unable to cast the now comma separated value to an integer would set the `Content-Length` to 0 internally.
So a request with:
```
Content-Length: 10
Content-Length: 10
```
would get transformed to:
```
Content-Length: 10, 10
```
Which would Waitress would then internally set to `Content-Lenght: 0`.
Waitress would then treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining.
### Patches
This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies.
The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don't cause any changes in behavior.
### Workarounds
Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn't use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method).
### Issues/more security issues:
* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
* email the Pylons Security mailing list: [email protected] (if security related) | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.parse_header']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'}, {'type': 'WEB', 'url': 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j7j6-7hfx-5522'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/waitress/PYSEC-2020-178.yaml'}] | {'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-20T23:02:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cmch-296j-wfvw | 2021-08-19T15:11:15Z | 2019-12-02T18:06:14Z | null | ['CVE-2019-10767'] | Arbitrary File Write in iobroker.js-controller | Versions of `iobroker.controller` prior to 2.0.25 are vulnerable to Path Traversal. The package fails to restrict access to folders outside of the intended `/adapter/<adapter-name>` folder, which may allow attackers to include arbitrary files in the system. An attacker would need to be authenticated to perform the attack but the package has authentication disabled by default.
## Recommendation
Upgrade to version 2.0.25 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'iobroker.js-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.25'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10767'}, {'type': 'WEB', 'url': 'https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1419'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T03:26:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-26p8-xrj2-mv53 | 2021-08-19T16:02:34Z | 2019-12-02T18:18:37Z | null | ['CVE-2019-10083'] | Apache NiFi process group information disclosure | When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10083'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2019-10083'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:30:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h47j-hc6x-h3qq | 2023-09-12T18:35:46Z | 2019-12-30T19:30:31Z | null | ['CVE-2019-10758'] | Remote Code Execution Vulnerability in NPM mongo-express | ### Impact
Remote code execution on the host machine by any authenticated user.
### Proof Of Concept
Launching mongo-express on a Mac, pasting the following into the "create index" field will pop open the Mac calculator:
```javascript
this.constructor.constructor("return process")().mainModule.require('child_process').execSync('/Applications/Calculator.app/Contents/MacOS/Calculator')
```
### Patches
Users should upgrade to version `0.54.0`
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
### References
[Snyk Security Advisory](https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215)
[CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10758)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:[email protected])
#### Thanks
@JLLeitschuh for finding and reporting this vulnerability | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mongo-express'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.54.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10758'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/pull/522'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-30T19:29:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7xxv-wpxj-mx5v | 2023-09-05T14:45:56Z | 2019-12-02T18:03:09Z | null | ['CVE-2019-19275'] | typed-ast Out-of-bounds Read | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'typed-ast'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19275'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c'}, {'type': 'WEB', 'url': 'https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce'}, {'type': 'WEB', 'url': 'https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b'}, {'type': 'WEB', 'url': 'https://bugs.python.org/issue36495'}, {'type': 'PACKAGE', 'url': 'https://github.com/python/typed_ast'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/LG5H4Q6LFVRX7SFXLBEJMNQFI4T5SCEA/'}] | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:25:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4x6v-rwh4-55jw | 2023-09-08T19:57:36Z | 2019-12-02T18:16:34Z | null | ['CVE-2019-18954'] | Pomelo allows external control of critical state data | Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in `template/game-server/app/servers/connector/handler/entryHandler.js` because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'pomelo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18954'}, {'type': 'WEB', 'url': 'https://github.com/NetEase/pomelo/issues/1149'}, {'type': 'WEB', 'url': 'https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation'}] | {'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:20:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hh3j-x4mc-g48r | 2022-04-19T18:42:25Z | 2019-12-26T18:22:36Z | null | ['CVE-2019-12418'] | Insufficiently Protected Credentials in Apache Tomcat | When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.99'}]}], 'database_specific': {'last_known_affected_version_range': '< 7.0.98'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.49'}]}], 'database_specific': {'last_known_affected_version_range': '< 8.5.48'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.29'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12418'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00029.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/43'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200107-0001/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K10107360?utm_source=f5support&utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4251-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4596'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html'}] | {'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T18:22:10Z', 'nvd_published_at': '2019-12-23T18:15:00Z'} |
1.4.0 | GHSA-35fr-h7jr-hh86 | 2021-04-27T18:03:07Z | 2019-12-06T18:55:47Z | null | [] | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') in Armeria | Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response.
### Impact
1. Cross-User Defacement
2. Cache Poisoning
3. Cross-Site Scripting (XSS)
4. Page Hijacking
### Root Cause
The root cause is due to the usage of Netty without the HTTP header validation.
https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/common/DefaultHttpHeaders.java#L23
### Patches
This vulnerability has been patched in 0.97.0.
### References
[CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html)
https://github.com/ratpack/ratpack/security/advisories/GHSA-mvqp-q37c-wf9j
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [GitHub](https://github.com/line/armeria/issues) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.linecorp.armeria:armeria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.85.0'}, {'fixed': '0.97.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86'}] | {'cwe_ids': ['CWE-113', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T18:03:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5h9j-q6j2-253f | 2021-06-15T17:23:03Z | 2019-12-02T18:13:28Z | null | ['CVE-2019-17632'] | Unescaped exception messages in error responses in Jetty | In Eclipse Jetty versions 9.4.21.v20190926, 9.4.22.v20191022, and 9.4.23.v20191118, the generation of default unhandled Error response content (in text/html and text/json Content-Type) does not escape Exception messages in stacktraces included in error output. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.21.v20190926'}, {'fixed': '9.4.24.v20191120'}]}], 'versions': ['9.4.21.v20190926']}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.22.v20191022'}, {'fixed': '9.4.24.v20191120'}]}], 'versions': ['9.4.22.v20191022']}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.23.v20191118'}, {'fixed': '9.4.24.v20191120'}]}], 'versions': ['9.4.23.v20191118']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17632'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=553443'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/SAITZ27GKPD2CCNHGT2VBT4VWIBUJJNS/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:09:14Z', 'nvd_published_at': '2019-11-25T22:15:00Z'} |
1.4.0 | GHSA-hm6q-r2jc-cpqh | 2023-09-06T20:10:25Z | 2019-12-16T19:29:33Z | null | ['CVE-2019-19771'] | lodahs is malware | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'lodahs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19771'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1417'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/lodahs'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-15T14:26:04Z', 'nvd_published_at': '2019-12-12T20:15:00Z'} |
1.4.0 | GHSA-m3jw-62m7-jjcm | 2023-09-05T14:46:42Z | 2019-12-02T18:02:02Z | null | ['CVE-2019-19274'] | typed-ast Out-of-bounds Read | typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'typed-ast'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19274'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c'}, {'type': 'WEB', 'url': 'https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce'}, {'type': 'WEB', 'url': 'https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b'}, {'type': 'WEB', 'url': 'https://bugs.python.org/issue36495'}, {'type': 'PACKAGE', 'url': 'https://github.com/python/typed_ast'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/LG5H4Q6LFVRX7SFXLBEJMNQFI4T5SCEA/'}] | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:13:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-744r-vv2g-2x6g | 2021-06-15T17:22:36Z | 2019-12-02T18:17:36Z | null | ['CVE-2019-10080'] | Apache NiFi information disclosure by XXE | The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10080'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3507'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2019-10080'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:27:21Z', 'nvd_published_at': '2019-11-19T22:15:00Z'} |
1.4.0 | GHSA-fmqw-vqh5-cwq9 | 2021-08-19T16:03:16Z | 2019-12-02T18:19:39Z | null | ['CVE-2019-12421'] | Apache NiFi user log out issue | When using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-security'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12421'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3362'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/cf6f5172503ce438c6c22c334c9367f774db7b24'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2019-12421'}] | {'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:32:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7xx3-m584-x994 | 2021-01-08T19:12:47Z | 2019-12-05T19:26:37Z | null | ['CVE-2019-16770'] | A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack | ## Keepalive thread overload/DoS
### Impact
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack.
If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough.
### Patches
This vulnerability is patched in Puma 4.3.1 and 3.12.2.
### Workarounds
Reverse proxies in front of Puma could be configured to always allow less than X keepalive connections to a Puma cluster or process, where X is the number of threads configured in Puma's thread pool.
### For more information
If you have any questions or comments about this advisory:
* Open an issue at [puma](github.com/puma/puma). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16770'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7xx3-m584-x994'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2019-16770.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html'}] | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:51Z', 'nvd_published_at': '2019-12-05T20:15:00Z'} |
1.4.0 | GHSA-jc43-qrrp-98f5 | 2023-04-25T16:31:36Z | 2019-12-17T22:53:40Z | null | ['CVE-2019-19714'] | Insert tag injection in the Contao login module | ### Impact
It is possible to inject insert tags into the login module which will be replaced when the page is rendered.
### Patches
Update to Contao 4.8.6.
### Workarounds
None.
### References
https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.4'}, {'fixed': '4.8.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-jc43-qrrp-98f5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19714'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19714.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}] | {'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T19:35:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-42fp-4hm3-j8r7 | 2021-08-31T21:37:18Z | 2019-01-04T17:46:08Z | null | ['CVE-2017-5934'] | Moderate severity vulnerability that affects moin | Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'moin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5934'}, {'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-42fp-4hm3-j8r7'}, {'type': 'PACKAGE', 'url': 'https://github.com/moinwiki/moin-1.9'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/10/msg00007.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3794-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4318'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00024.html'}, {'type': 'WEB', 'url': 'http://moinmo.in/SecurityFixes'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-45r8-3495-x6rm | 2022-09-17T00:06:13Z | 2019-01-04T17:43:36Z | null | ['CVE-2018-18893'] | Jinjava calls getClass | Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.hubspot.jinjava:jinjava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18893'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/pull/230'}, {'type': 'PACKAGE', 'url': 'https://github.com/HubSpot/jinjava'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/blob/master/CHANGES.md'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-45r8-3495-x6rm'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4rm3-4mq4-mfwr | 2022-09-14T22:29:42Z | 2019-01-04T17:43:22Z | null | ['CVE-2018-20595'] | Cross-Site Request Forgery (CSRF) in hswebframework.web:hsweb-commons | A CSRF issue was discovered in web/authorization/oauth2/controller/OAuth2ClientController.java in hsweb 3.0.4 because the state parameter in the request is not compared with the state parameter in the session after user authentication is successful. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.hswebframework.web:hsweb-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20595'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/issues/107'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4rm3-4mq4-mfwr'}, {'type': 'PACKAGE', 'url': 'https://github.com/hs-web/hsweb-framework'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wr5r-m8pc-85j9 | 2020-06-16T22:01:07Z | 2019-01-25T16:18:49Z | null | ['CVE-2019-3772'] | Low severity vulnerability that affects org.springframework.integration:spring-integration-ws and org.springframework.integration:spring-integration-xml | Spring Integration (spring-integration-xml and spring-integration-ws modules), versions 4.3.18, 5.0.10, 5.1.1, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3772'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wr5r-m8pc-85j9'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3772'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106749'}] | {'cwe_ids': ['CWE-611'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m9mq-p2f9-cfqv | 2023-08-08T10:24:53Z | 2019-01-04T17:46:30Z | null | ['CVE-2018-7753'] | Bleach URI Scheme Restriction Bypass | An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'bleach'}, 'ecosystem_specific': {'affected_functions': ['bleach.sanitizer.BleachSanitizerFilter.allow_token']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7753'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/892252'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m9mq-p2f9-cfqv'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla/bleach'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/releases/tag/v2.1.3'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2x54-j4m3-r6wx | 2023-08-07T15:57:08Z | 2019-01-04T17:44:48Z | null | ['CVE-2019-3575'] | sqla-yaml-fixtures is vulnerable to Code Injection | Sqla_yaml_fixtures versions up to 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in `sqla_yaml_fixtures.load`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'sqla-yaml-fixtures'}, 'ecosystem_specific': {'affected_functions': ['sqla_yaml_fixtures.load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3575'}, {'type': 'WEB', 'url': 'https://github.com/schettino72/sqla_yaml_fixtures/issues/20'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2x54-j4m3-r6wx'}, {'type': 'PACKAGE', 'url': 'https://github.com/schettino72/sqla_yaml_fixtures'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6qvp-r6r3-9p7h | 2023-08-26T00:01:34Z | 2019-01-17T14:05:03Z | null | ['CVE-2018-14404'] | Nokogiri NULL Pointer Dereference | A NULL pointer dereference vulnerability exists in the `xpath.c:xmlXPathCompOpEval()` function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the `XPATH_OP_AND` or `XPATH_OP_OR` case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14404'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1785'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1543'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1595985'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-14404.yml'}, {'type': 'WEB', 'url': 'https://gitlab.gnome.org/GNOME/libxml2/issues/10'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190719-0002/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3739-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3739-2/'}] | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4p24-vmcr-4gqj | 2023-08-25T23:47:33Z | 2019-01-17T13:57:27Z | null | ['CVE-2016-10735'] | Bootstrap XSS vulnerability | In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute. Note that this is a different vulnerability than CVE-2018-14041.
See https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ for more info. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-beta'}, {'fixed': '4.0.0-beta.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10735'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/20184'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/23679'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/23687'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/26460'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1076'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1570'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3023'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0132'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0133'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2016-10735.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:39Z', 'nvd_published_at': '2019-01-09T05:29:00Z'} |
1.4.0 | GHSA-8222-6fc8-mhvf | 2021-06-15T16:59:20Z | 2019-01-25T16:18:52Z | null | ['CVE-2019-3773'] | Vulnerability that affects org.springframework.ws:spring-ws and org.springframework.ws:spring-xml | Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3773'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8222-6fc8-mhvf'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3773'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2021.html'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:54Z', 'nvd_published_at': '2019-01-18T22:29:00Z'} |
1.4.0 | GHSA-r28v-mw67-m5p9 | 2023-09-05T12:37:34Z | 2019-01-04T17:50:07Z | null | ['CVE-2018-7536'] | Django Denial-of-service possibility in urlize and urlizetrunc template filters | An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The `django.utils.html.urlize()` function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The `urlize()` function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11'}, {'fixed': '1.11.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7536'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0051'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0082'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0265'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r28v-mw67-m5p9'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3591-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4161'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2018/mar/06/security-releases/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103361'}] | {'cwe_ids': ['CWE-185'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:19Z', 'nvd_published_at': '2018-03-09T20:29:00Z'} |
1.4.0 | GHSA-mc23-976p-j42x | 2022-12-18T23:44:26Z | 2019-01-14T16:19:55Z | null | ['CVE-2019-0542'] | xterm vulnerable to remote code execution | A remote code execution vulnerability exists in Xterm.js when the component mishandles special characters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'xterm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'xterm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'xterm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0542'}, {'type': 'WEB', 'url': 'https://github.com/xtermjs/xterm.js/commit/3592c641cd0348e0b698e8a180aea2072c6bcd9a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1422'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2551'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2552'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mc23-976p-j42x'}, {'type': 'PACKAGE', 'url': 'https://github.com/xtermjs/xterm.js'}, {'type': 'WEB', 'url': 'https://github.com/xtermjs/xterm.js/releases/tag/3.8.1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106434'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:48Z', 'nvd_published_at': '2019-01-09T15:29:00Z'} |
1.4.0 | GHSA-f9hv-mg5h-xcw9 | 2023-06-12T22:34:10Z | 2019-01-04T19:06:57Z | null | ['CVE-2018-19360'] | Deserialization of Untrusted Data in jackson-databind due to polymorphic deserialization | FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19360'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f9hv-mg5h-xcw9'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TINKERPOP-2121'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107985'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4q69-q4q7-x82c | 2023-09-06T20:01:34Z | 2019-01-04T17:41:46Z | null | ['CVE-2017-18353'] | rendertron can remotely shut down Chrome instance | Rendertron 1.0.0 includes an `_ah/stop` route to shutdown the Chrome instance responsible for serving render requests to all users. Visiting this route with a GET request allows any unauthorized remote attacker to disable the core service of the application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18353'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChrome/rendertron'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4q69-q4q7-x82c'}] | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-77rc-x84q-pv4f | 2022-09-14T22:41:33Z | 2019-01-25T16:19:19Z | null | ['CVE-2018-20245'] | Improper Certificate Validation in Apache Airflow | The LDAP auth backend (airflow.contrib.auth.backends.ldap_auth) prior to Apache Airflow 1.10.1 was misconfigured and contained improper checking of exceptions which disabled server certificate checking. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20245'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-77rc-x84q-pv4f'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b549c7573b342a6e457e5a3225c33054244343927bbfb2a4cdc4cf73@%3Cdev.airflow.apache.org%3E'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3wc8-659g-r88q | 2020-06-16T20:56:44Z | 2019-01-25T16:18:56Z | null | ['CVE-2019-3774'] | Low severity vulnerability that affects org.springframework.batch:spring-batch-core | Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.batch:spring-batch-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.batch:spring-batch-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.batch:spring-batch-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3774'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3wc8-659g-r88q'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01292194daa9ed3117b34dabec0c26929f6db13b9613fc144f720d52@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0153a08177fcfac7584c7b9ea3027f1e8f18f770126f905b9989190e@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08e7ddc354bdcbf95d88399f18b3d804865034f8bc706095e594b29f@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2349237482bcec43632d9d78d7d2804520d9a82f4d8b1fd96bb616b8@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r47c7f67a3067ec09262eef0705abc42ea1b646699d9198bcaf8dad02@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5fbb63e405d2211c16524d33f52e3b122109d3bc88d5f74623fb212d@%3Ccommits.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r78645ca0eef44a276e144447fb2087db758b1fb8826d0330b3f0da1a@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79991aeb5d0c53c67e400e037c72758a06607752ca2f23b5302dd61f@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96d90e59bb12af5e5c631dcf7d7d80857a52bf3dc44d5b85553e7fc4@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra329bb85da9da93ac6f9b5fc0fc5446a3af0ee2a62c5de484da0af54@%3Ccommits.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra62a3bf48ab4e0e9aaed970b03d79a73224d68a4275858c707542f6c@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8c7573911082e9968f4835943045ad0952232bb6314becf23dc3de5@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raae74a9290784e20e86fcd4e2525fa8700aeed6f65f3613b5b04bb11@%3Ccommits.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb9fe3ae33246d7f11604a1c85c861cb013a1e32248a43a0c22457107@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd26a5409af7356b5f69b2fafae3cf621bff8bf155f50e9ccf9ed5f6@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd4945d66d8bb2fc92396af56a70ede4af983a2c98166f1281338346@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree71c6425d2cc0e36b77bda6902965a657c1e09c7229459811d66474@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf83697efcbcfe1131e31bbc7025cb3ee1db5d9185e9481093b2ef961@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfea6eebfebb13bc015f258e7fa31d4e24a4202601be3b307da28d530@%3Ccommits.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3774'}] | {'cwe_ids': ['CWE-611'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9gqg-3fxr-9hv7 | 2023-08-30T23:28:15Z | 2019-01-25T16:19:09Z | null | ['CVE-2017-17836'] | Apache Airflow vulnerable to XSS | In Apache Airflow 1.8.2 and earlier, an experimental Airflow feature displayed authenticated cookies, as well as passwords to databases used by Airflow. An attacker who has limited access to airflow, weather it be via XSS or by leaving a machine unlocked can exfil all credentials from the system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17836'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9gqg-3fxr-9hv7'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-38rv-5jqc-m2cv | 2023-09-01T20:25:56Z | 2019-01-04T17:48:09Z | null | ['CVE-2017-0906'] | Recurly vulnerable to SSRF | The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.2 is vulnerable to a Server-Side Request Forgery vulnerability in the `Resource.get` method that could result in compromise of API keys or other critical resources. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.22'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0906'}, {'type': 'WEB', 'url': 'https://github.com/recurly/recurly-client-python/commit/049c74699ce93cf126feff06d632ea63fba36742'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288635'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38rv-5jqc-m2cv'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3mgp-fx93-9xv5 | 2023-01-23T20:33:58Z | 2019-01-17T13:57:34Z | null | ['CVE-2018-20676'] | XSS vulnerability that affects bootstrap | In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20676'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27044'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/27047'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/commit/2a5ba23ce8f041f3548317acc992ed8a736b609d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1076'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1570'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3023'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0132'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0133'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:33Z', 'nvd_published_at': '2019-01-09T05:29:00Z'} |
1.4.0 | GHSA-7qqv-r2q4-jxhm | 2021-09-03T21:43:07Z | 2019-01-14T16:19:31Z | null | ['CVE-2018-1000809'] | High severity vulnerability that affects privacyIDEA | privacyIDEA version 2.23.1 and earlier contains a Improper Input Validation vulnerability in token validation api that can result in Denial-of-Service. This attack appear to be exploitable via http request with user=<space>&pass= to /validate/check url. This vulnerability appears to have been fixed in 2.23.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'privacyIDEA'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.23.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000809'}, {'type': 'WEB', 'url': 'https://github.com/privacyidea/privacyidea/issues/1227'}, {'type': 'WEB', 'url': 'https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7qqv-r2q4-jxhm'}, {'type': 'PACKAGE', 'url': 'https://github.com/privacyidea/privacyidea'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-68wv-rjrm-576p | 2022-09-14T22:40:56Z | 2019-01-25T16:19:14Z | null | ['CVE-2017-17835'] | Cross-Site Request Forgery (CSRF) in Apache Airflow | In Apache Airflow 1.8.2 and earlier, a CSRF vulnerability allowed for a remote command injection on a default install of Airflow. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17835'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-68wv-rjrm-576p'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ph58-4vrj-w6hr | 2023-01-23T21:29:22Z | 2019-01-17T13:57:56Z | null | ['CVE-2018-20677'] | bootstrap Cross-site Scripting vulnerability | In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20677'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27045'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/27047'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/commit/2a5ba23ce8f041f3548317acc992ed8a736b609d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1076'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1570'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3023'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0132'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0133'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:11Z', 'nvd_published_at': '2019-01-09T05:29:00Z'} |
1.4.0 | GHSA-mx9v-gmh4-mgqw | 2022-09-14T22:31:36Z | 2019-01-04T19:07:01Z | null | ['CVE-2018-19361'] | Deserialization of Untrusted Data in jackson-databind | FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19361'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mx9v-gmh4-mgqw'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TINKERPOP-2121'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107985'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j87c-cj65-vmh5 | 2023-09-06T20:06:31Z | 2019-01-04T17:41:51Z | null | ['CVE-2017-18354'] | rendertron LFI vulnerability | Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18354'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChrome/rendertron'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j87c-cj65-vmh5'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xvwv-6wvx-px9x | 2023-09-01T21:13:18Z | 2019-01-04T17:47:21Z | null | ['CVE-2017-1000484'] | Plone Open Redirect | By linking to a specific url in Plone 2.5-5.1rc1 with a parameter, an attacker could send you to his own website. On its own this is not so bad: the attacker could more easily link directly to his own website instead. But in combination with another attack, you could be sent to the Plone login form and login, then get redirected to the specific url, and then get a second redirect to the attacker website. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000484'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/2232'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xvwv-6wvx-px9x'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20171128/an-open-redirection-when-calling-a-specific-url'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mvjj-gqq2-p4hw | 2023-09-13T19:45:25Z | 2019-01-04T19:05:35Z | null | ['CVE-2018-6341'] | Cross-Site Scripting in react-dom | Affected versions of `react-dom` are vulnerable to Cross-Site Scripting (XSS). The package fails to validate attribute names in HTML tags which may lead to Cross-Site Scripting in specific scenarios. This may allow attackers to execute arbitrary JavaScript in the victim's browser. To be affected by this vulnerability, the application needs to:
- be a server-side React app
- be rendered to HTML using `ReactDOMServer`
- include an attribute name from user input in an HTML tag
## Recommendation
If you are using `react-dom` 16.0.x, upgrade to 16.0.1 or later.
If you are using `react-dom` 16.1.x, upgrade to 16.1.2 or later.
If you are using `react-dom` 16.2.x, upgrade to 16.2.1 or later.
If you are using `react-dom` 16.3.x, upgrade to 16.3.3 or later.
If you are using `react-dom` 16.4.x, upgrade to 16.4.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.0.1'}]}], 'versions': ['16.0.0']}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.1.0'}, {'fixed': '16.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.2.0'}, {'fixed': '16.2.1'}]}], 'versions': ['16.2.0']}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.3.0'}, {'fixed': '16.3.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.4.0'}, {'fixed': '16.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6341'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mvjj-gqq2-p4hw'}, {'type': 'WEB', 'url': 'https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:react-dom:20180802'}, {'type': 'WEB', 'url': 'https://twitter.com/reactjs/status/1024745321987887104'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1421'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-chj8-5xgw-wcvj | 2021-09-09T18:04:45Z | 2019-01-07T19:14:46Z | null | ['CVE-2016-8750'] | Moderate severity vulnerability that affects org.apache.karaf:apache-karaf | Apache Karaf prior to 4.0.8 used the LDAPLoginModule to authenticate users to a directory via LDAP. However, it did not encoding usernames properly and hence was vulnerable to LDAP injection attacks leading to a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8750'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1322'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-chj8-5xgw-wcvj'}, {'type': 'WEB', 'url': 'https://karaf.apache.org/security/cve-2016-8750.txt'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103098'}] | {'cwe_ids': ['CWE-90'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-98gj-wwxm-cj3h | 2023-08-07T16:27:52Z | 2019-01-04T17:47:50Z | null | ['CVE-2017-16876'] | mistune Cross-site scripting (XSS) vulnerability | Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the "key" argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mistune'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16876'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1524596'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-98gj-wwxm-cj3h'}, {'type': 'PACKAGE', 'url': 'https://github.com/lepture/mistune'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/blob/master/CHANGES.rst'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/NUR3GMHQBMA3UC4PFMCK6GCLOQC4LQQC/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vx85-mj8c-4qm6 | 2023-09-11T18:30:27Z | 2019-01-17T13:56:33Z | null | ['CVE-2018-11798'] | Apache Thrift Node.js static web server sandbox escape | The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.2'}, {'fixed': '0.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11798'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/pull/1606'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/commit/2a2b72f6c8aef200ecee4984f011e06052288ff2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1545'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vx85-mj8c-4qm6'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/THRIFT-4647'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6e9edd282684896cedf615fb67a02bebfe6007f2d5baf03ba52e34fd@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227094236/http://www.securityfocus.com/bid/106501'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}] | {'cwe_ids': ['CWE-538'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-37hp-765x-j95x | 2023-09-05T14:07:04Z | 2019-01-04T17:50:26Z | null | ['CVE-2017-7233'] | Django Open redirect and possible XSS attack via user-supplied numeric redirect URLs | Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10'}, {'fixed': '1.10.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9'}, {'fixed': '1.9.13'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7233'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1445'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1451'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1462'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1470'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1596'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3093'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-37hp-765x-j95x'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3835'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97406'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1038177'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c8hm-7hpq-7jhg | 2021-06-10T23:51:07Z | 2019-01-04T19:07:03Z | null | ['CVE-2018-19362'] | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19362'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c8hm-7hpq-7jhg'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TINKERPOP-2121'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107985'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4gq5-ch57-c2mg | 2023-09-13T18:31:09Z | 2019-01-04T19:09:49Z | null | ['CVE-2018-14719'] | Arbitrary Code Execution in jackson-databind | FasterXML jackson-databind 2.x before 2.9.7, 2.8.11.3, and 2.7.9.5 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14719'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:21Z', 'nvd_published_at': '2019-01-02T18:29:00Z'} |
1.4.0 | GHSA-cq9c-55r7-455x | 2022-09-14T22:34:31Z | 2019-01-07T19:14:51Z | null | ['CVE-2018-11787'] | Improper Authentication in Apache Karaf | In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11787'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cq9c-55r7-455x'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/KARAF-4993'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d9ba4c3104ba32225646879a057b75b54430f349c246c85469037d3c@%3Cdev.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://karaf.apache.org/security/cve-2018-11787.txt'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-29gp-92wp-94q8 | 2022-08-03T19:36:45Z | 2019-01-04T17:41:20Z | null | ['CVE-2018-6342'] | react-dev-utils on Windows vulnerable to Remote Code Execution | `react-dev-utils` on Windows is vulnerable to remote code execution.
## Recommendation
Update to one of the following versions, depending on the release line that you are using.
- 1.0.4
- 2.0.2
- 3.1.2
- 4.2.2
- 5.0.2
- 6.0.0-next.a671462c | [] | [{'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6342'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/pull/4866'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-29gp-92wp-94q8'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/create-react-app'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/releases/tag/v1.1.5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/695'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:46Z', 'nvd_published_at': '2018-12-31T22:29:00Z'} |
1.4.0 | GHSA-2f9x-5v75-3qv4 | 2023-09-05T14:06:09Z | 2019-01-04T17:50:00Z | null | ['CVE-2018-7537'] | Django Denial-of-service possibility in truncatechars_html and truncatewords_html template filters | An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11'}, {'fixed': '1.11.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7537'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0265'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2f9x-5v75-3qv4'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3591-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4161'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2018/mar/06/security-releases/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103357'}] | {'cwe_ids': ['CWE-185'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h4hv-m4h4-mhwg | 2023-09-05T18:19:49Z | 2019-01-04T17:50:17Z | null | ['CVE-2017-7234'] | Django open redirect | A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the `django.views.static.serve()` view could redirect to any other domain, aka an open redirect vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10'}, {'fixed': '1.10.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9'}, {'fixed': '1.9.13'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7234'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h4hv-m4h4-mhwg'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170429023907/http://www.securitytracker.com/id/1038177'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170526042328/http://www.securityfocus.com/bid/97401'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3835'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j88m-953w-8r2c | 2023-09-06T20:07:11Z | 2019-01-07T19:14:21Z | null | ['CVE-2017-18352'] | rendertron XSS vulnerability | Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18352'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChrome/rendertron'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j88m-953w-8r2c'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q485-j897-qc27 | 2022-09-14T22:34:12Z | 2019-01-07T19:14:34Z | null | ['CVE-2018-20433'] | XML External Entity Reference in mchange:c3p0 | c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.mchange:c3p0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.5.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20433'}, {'type': 'WEB', 'url': 'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q485-j897-qc27'}, {'type': 'PACKAGE', 'url': 'https://github.com/zhutougg/c3p0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/12/msg00021.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BFIVX6HOVNLAM7W3SUAMHYRNLCVQSAWR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-92wj-x78c-m4fx | 2023-09-11T22:40:24Z | 2019-01-07T19:14:49Z | null | ['CVE-2018-11788'] | XML External Entity Reference in Apache Karaf | Apache Karaf provides a features deployer, which allows users to "hot deploy" a features XML by dropping the file directly in the deploy folder. The features XML is parsed by XMLInputFactory class. Apache Karaf XMLInputFactory class doesn't contain any mitigation codes against XXE. This is a potential security risk as an user can inject external XML entities in Apache Karaf version prior to 4.1.7 or 4.2.2. It has been fixed in Apache Karaf 4.1.7 and 4.2.2 releases. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.specs:org.apache.karaf.specs.java.xml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.specs:org.apache.karaf.specs.java.xml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11788'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/commit/0c36c50bc158739c8fc8543122a6740c54adafca'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/karaf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227101219/https://www.securityfocus.com/bid/106479/'}, {'type': 'WEB', 'url': 'http://karaf.apache.org/security/cve-2018-11788.txt'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9r8w-6x8c-6jr9 | 2023-09-05T17:57:28Z | 2019-01-04T17:50:34Z | null | ['CVE-2017-12794'] | Django vulnerable to XSS on 500 pages | In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with `DEBUG = True` (which makes this page accessible) in your production settings. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12794'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9r8w-6x8c-6jr9'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3559-1/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170927072701/http://www.securitytracker.com/id/1039264'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227150819/http://www.securityfocus.com/bid/100643'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2017/sep/05/security-releases/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jhjh-ghwx-6h7r | 2023-09-01T09:30:29Z | 2019-01-17T13:56:18Z | null | ['CVE-2017-1002157'] | modulemd uses an unsafe function for processing externally provided data | modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'modulemd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002157'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhjh-ghwx-6h7r'}, {'type': 'PACKAGE', 'url': 'https://github.com/xsuchy/modulemd'}, {'type': 'WEB', 'url': 'https://pagure.io/modulemd/issue/55'}] | {'cwe_ids': ['CWE-20', 'CWE-242'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:31Z', 'nvd_published_at': '2019-01-10T21:29:00Z'} |
1.4.0 | GHSA-x2w5-5m2g-7h5m | 2023-06-12T22:34:49Z | 2019-01-04T19:09:46Z | null | ['CVE-2018-14720'] | XML External Entity Reference (XXE) in jackson-databind | FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14720'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1106'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1107'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1108'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x2w5-5m2g-7h5m'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}] | {'cwe_ids': ['CWE-502', 'CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rprw-h62v-c2w7 | 2023-09-05T17:58:47Z | 2019-01-04T17:45:26Z | null | ['CVE-2017-18342'] | PyYAML insecurely deserializes YAML strings leading to arbitrary code execution | In PyYAML before 4.1, the `yaml.load()` API could execute arbitrary code. In other words, `yaml.safe_load` is not used. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'PyYAML'}, 'ecosystem_specific': {'affected_functions': ['yaml.load', 'yaml.dump', 'safe_dump_all', 'safe_dump', 'yaml.CSafeLoader', 'yaml.CLoader', 'yaml.CSafeDumper', 'yaml.CDumper', 'yaml.SafeDumper', 'yaml.Dumper', 'yaml.SafeLoader', 'yaml.Loader']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18342'}, {'type': 'WEB', 'url': 'https://github.com/marshmallow-code/apispec/issues/278'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/issues/193'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/pull/74'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/commit/7b68405c81db889f83c32846462b238ccae5be80'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/blob/master/CHANGES'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-45'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wjxj-f8rg-99wx | 2023-03-01T20:05:50Z | 2019-01-17T13:56:40Z | null | ['CVE-2018-1320'] | Improper Input Validation in Apache Thrift | Apache Thrift Java client library versions 0.5.0 prior to 0.9.3-1 and 0.10.0 prior to 0.12.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.9.3-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2413'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/thrift'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/releases/tag/0.9.3.1'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/THRIFT-4506'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/07c3cd5a2953a4b253eee4437b1397b1603d0f886437e19b657d2c54@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/187684ac8b94d55256253f5220cb55e8bd568afdf9a8a86e9bbb66c9@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d3b6849fcf4cd1e87703b3dde0d57aabeb9ba0193dc0cf3c97f545d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6b07f6f618155c777191b4fad8ade0f0cf4ed4c12a1a746ce903d816@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8be5b16c02567fff61b1284e5df433a4e38617bc7de4804402bf62be@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/da5234b5e78f1c99190407f791dfe1bf6c58de8d30d15974a9669be3@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dbe3a39b48900318ad44494e8721f786901ba4520cd412c7698f534f@%3Cdev.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dfee89880c84874058c6a584d8128468f8d3c2ac25068ded91073adc@%3Cuser.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e825ff2f4e129c0ecdb6a19030b53c1ccdf810a8980667628d0c6a80@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r09c3dcdccf4b74ad13bda79b354e6b793255ccfe245cca1b8cee23f5@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1015eaadef8314daa9348aa423086a732cfeb998ceb5d42605c9b0b5@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2278846f7ab06ec07a0aa31457235e0ded9191b216cba55f3f315f16@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r261972a3b14cf6f1dcd94b1b265e9ef644a38ccdf0d0238fa0c4d459@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d71a6dbb063aa61ba81278fe622b20bfe7501bb3821c27695641ac3@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/02/msg00008.html'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K36361684'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227094237/http://www.securityfocus.com/bid/106551'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/07/24/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106551'}] | {'cwe_ids': ['CWE-20', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:45Z', 'nvd_published_at': '2019-01-07T17:29:00Z'} |
1.4.0 | GHSA-cf66-xwfp-gvc4 | 2022-04-06T20:39:38Z | 2019-01-04T17:40:59Z | null | ['CVE-2018-14732'] | Missing Origin Validation in webpack-dev-server | Versions of `webpack-dev-server` before 3.1.10 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated.
## Recommendation
For `webpack-dev-server` update to version 3.1.11 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'webpack-dev-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14732'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/issues/1445'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/issues/1620'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10'}, {'type': 'PACKAGE', 'url': 'https://github.com/webpack/webpack-dev-server'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/blob/master/CHANGELOG.md#3111-2018-12-21'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/725'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qqv6-5w6p-3pgr | 2021-09-16T20:04:03Z | 2019-01-04T17:43:30Z | null | ['CVE-2018-20594'] | Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons | An issue was discovered in hsweb 3.0.4. It is a reflected XSS vulnerability due to the absence of type parameter checking in FlowableModelManagerController.java. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.hswebframework.web:hsweb-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20594'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/issues/107'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/commit/b72a2275ed21240296c6539bae1049c56abb542f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qqv6-5w6p-3pgr'}, {'type': 'PACKAGE', 'url': 'https://github.com/hs-web/hsweb-framework'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8fg4-j562-mjrc | 2022-09-14T22:38:08Z | 2019-01-25T16:19:01Z | null | ['CVE-2017-15720'] | Improper Input Validation in Apache Airflow resulting in Remote Code Execution | In Apache Airflow 1.8.2 and earlier, an authenticated user can execute code remotely on the Airflow webserver by creating a special object. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15720'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8fg4-j562-mjrc'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9mxf-g3x6-wv74 | 2022-09-14T22:31:12Z | 2019-01-04T19:07:06Z | null | ['CVE-2018-14721'] | Server-Side Request Forgery (SSRF) in jackson-databind | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14721'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1106'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1107'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1108'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9mxf-g3x6-wv74'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-337x-4q8g-prc5 | 2023-09-05T18:43:33Z | 2019-01-14T16:20:05Z | null | ['CVE-2019-3498'] | Improper Input Validation in Django | In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in `django.views.defaults.page_not_found()`, leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3498'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-337x-4q8g-prc5'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3851-1/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227094237/http://www.securityfocus.com/bid/106453'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4363'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/jan/04/security-releases/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:52Z', 'nvd_published_at': '2019-01-09T23:29:00Z'} |
1.4.0 | GHSA-645p-88qh-w398 | 2023-09-14T14:00:55Z | 2019-01-04T19:06:55Z | null | ['CVE-2018-14718'] | Arbitrary Code Execution in jackson-databind | FasterXML jackson-databind 2.x before 2.9.7, 2.8.11.3, 2.7.9.5, and 2.6.7.3 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14718'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-645p-88qh-w398'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106601'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:52Z', 'nvd_published_at': '2019-01-02T18:29:00Z'} |
1.4.0 | GHSA-mh24-7wvg-v88g | 2023-09-01T09:46:45Z | 2019-01-30T20:56:26Z | null | ['CVE-2019-6802'] | CRLF Injection in pypiserver | CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP headers and possibly conduct XSS attacks via a `%0d%0a` in a URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pypiserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6802'}, {'type': 'WEB', 'url': 'https://github.com/pypiserver/pypiserver/issues/237'}, {'type': 'WEB', 'url': 'https://github.com/pypiserver/pypiserver/commit/1375a67c55a9b8d4619df30d2a1c0b239d7357e6'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mh24-7wvg-v88g'}, {'type': 'PACKAGE', 'url': 'https://github.com/pypiserver/pypiserver'}] | {'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:14Z', 'nvd_published_at': '2019-01-25T04:29:00Z'} |
1.4.0 | GHSA-54mg-vgrp-mwx9 | 2021-08-04T15:01:30Z | 2019-05-14T04:01:37Z | null | ['CVE-2019-11808'] | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack | Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-session'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-groovy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11808'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/issues/1448'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/releases/tag/v1.6.1'}] | {'cwe_ids': ['CWE-338'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T03:48:09Z', 'nvd_published_at': '2019-05-07T07:29:00Z'} |
1.4.0 | GHSA-jgmr-wrwx-mgfj | 2021-08-03T21:46:37Z | 2019-05-14T04:02:35Z | null | ['CVE-2019-3797'] | Exposure of Sensitive Information to an Unauthorized Actor and SQL Injection in Spring Data JPA | This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ?startingWith?, ?endingWith? or ?containing? could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3797'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3797'}] | {'cwe_ids': ['CWE-200', 'CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-10T04:22:00Z', 'nvd_published_at': '2019-05-06T16:29:00Z'} |
1.4.0 | GHSA-wv67-9jq7-8r69 | 2021-08-03T21:47:43Z | 2019-05-14T04:02:45Z | null | ['CVE-2019-5432'] | Improper Input Validation and Buffer Over-read in mqtt-packet | A specifically malformed MQTT Subscribe packet crashes MQTT Brokers using the mqtt-packet module versions < 3.5.1, 4.0.0 - 4.1.3, 5.0.0 - 5.6.1, 6.0.0 - 6.1.2 for decoding. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.6.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5432'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/541354'}] | {'cwe_ids': ['CWE-125', 'CWE-126'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-10T04:24:12Z', 'nvd_published_at': '2019-05-06T17:29:00Z'} |
1.4.0 | GHSA-2xv3-h762-ccxv | 2020-08-31T18:31:05Z | 2019-05-29T19:18:02Z | null | [] | Out-of-bounds Read in concat-with-sourcemaps | Versions of `concat-with-sourcemaps` before 1.0.6 allocates uninitialized Buffers when a number is passed as a separator.
## Recommendation
Update to version 1.0.6 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'concat-with-sourcemaps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/320166'}, {'type': 'WEB', 'url': 'https://github.com/floridoo/concat-with-sourcemaps/blob/v1.0.5/index.js#L18'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/644'}] | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:17:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-37pw-qw47-4jxm | 2021-05-11T16:17:59Z | 2019-05-31T16:09:15Z | null | ['CVE-2018-8029'] | Privilege escalation vulnerability in Apache Hadoop | In Apache Hadoop versions 3.0.0-alpha1 to 3.1.0, 2.9.0 to 2.9.1, and 2.2.0 to 2.8.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8029'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0b8d58e02dbd0fb8bf7320c514fe58da1d6728bdc150f1ba04e0d9fc@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/17084c09e6dedf60efe08028b429c92ffd28aacc28454e4fa924578a@%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a0164b87660223a2d491f83c88f905fe1a9fa8dc795148d9b0d968c8@%3Cdev.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a97c53a81e639ca2fc7b8f61a4fcd1842c2a78544041244a7c624727@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190617-0001/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108518'}] | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T16:08:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6qh5-wx38-q92g | 2020-08-31T18:22:04Z | 2019-05-30T17:15:59Z | null | [] | Directory Traversal in ltt.js | Affected versions of `ltt.js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] | [{'package': {'ecosystem': 'npm', 'name': 'ltt.js'}, 'versions': ['1.0.0']}] | [{'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt.js'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/ltt.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/411'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:15:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-72fv-qgj6-2w2p | 2021-08-03T21:27:01Z | 2019-05-01T18:37:08Z | null | ['CVE-2015-9286'] | Cross-site Scripting in NodeBB | Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9286'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/pull/3371'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/compare/56b79a9...4de7529'}, {'type': 'WEB', 'url': 'https://vulners.com/securityvulns/SECURITYVULNS:DOC:32625'}, {'type': 'WEB', 'url': 'https://www.vulnerability-lab.com/get_content.php?id=1608'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-01T18:20:32Z', 'nvd_published_at': '2019-04-30T14:29:00Z'} |
1.4.0 | GHSA-g86p-hgx5-2pfh | 2022-03-04T21:16:27Z | 2019-05-29T18:48:11Z | null | ['CVE-2019-12300'] | Improper Authentication in Buildbot | Buildbot before 1.8.2 and 2.x before 2.3.1 accepts a user-submitted authorization token from OAuth and uses it to authenticate a user. If an attacker has a token allowing them to read the user details of a victim, they can login as the victim. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'buildbot'}, 'ecosystem_specific': {'affected_functions': ['buildbot.www.oauth2.OAuth2Auth.acceptToken']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'buildbot'}, 'ecosystem_specific': {'affected_functions': ['buildbot.www.oauth2.OAuth2Auth.acceptToken']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12300'}, {'type': 'PACKAGE', 'url': 'https://github.com/buildbot/buildbot'}, {'type': 'WEB', 'url': 'https://github.com/buildbot/buildbot/wiki/OAuth-vulnerability-in-using-submitted-authorization-token-for-authentication'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:47:56Z', 'nvd_published_at': '2019-05-23T15:30:00Z'} |
1.4.0 | GHSA-8v67-x8q5-3x3g | 2021-08-04T14:53:05Z | 2019-05-14T04:01:27Z | null | ['CVE-2018-19048'] | Cross-Site Scripting in simditor | Versions of `simditor` prior to 2.3.22 are vulnerable to Cross-Site Scripting. The package does not sanitize user input that is rendered with `innerHTML`, allowing attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 2.3.22 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'simditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19048'}, {'type': 'WEB', 'url': 'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd'}, {'type': 'WEB', 'url': 'https://github.com/hkglue/simditor_demo.git'}, {'type': 'WEB', 'url': 'https://github.com/hkglue/simditor_dom_xss/blob/master/README.md'}, {'type': 'WEB', 'url': 'https://github.com/mycolorway/simditor/releases/tag/v2.3.22'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SIMDITOR-174638'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/884'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T01:08:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5f7m-mmpc-qhh4 | 2022-08-03T20:30:06Z | 2019-05-23T09:27:00Z | null | [] | mysql Node.JS Module Vulnerable to Remote Memory Exposure | Versions of `mysql` before 2.14.0 are vulnerable to remove memory exposure.
Affected versions of `mysql` package allocate and send an uninitialized memory over the network when a number is provided as a password.
Only `mysql` running on Node.js versions below 6.0.0 are affected due to a throw added in newer node.js versions.
Proof of Concept:
```
require('mysql').createConnection({
host: 'localhost',
user: 'user',
password : USERPROVIDEDINPUT, // number
database : 'my_db'
}).connect();
```
## Recommendation
Update to version 2.14.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha8'}, {'fixed': '2.14.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mysqljs/mysql/commit/192fe45593ba5768534afb6f2154432ca67a5002'}, {'type': 'WEB', 'url': 'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52'}, {'type': 'PACKAGE', 'url': 'https://github.com/mysqljs/mysql'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/602'}] | {'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-23T07:40:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7jfh-2xc9-ccv7 | 2020-08-31T18:29:45Z | 2019-05-31T23:46:40Z | null | [] | Cross-Site Scripting in public | All versions of `public` are vulnerable to stored cross-site scripting (XSS).
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time. | [] | [{'package': {'ecosystem': 'npm', 'name': 'public'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'public'}, 'versions': ['0.1.5']}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/316346'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/609'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:44:38Z', 'nvd_published_at': None} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.