schema_version string | id string | modified timestamp[s] | published timestamp[s] | aliases list | summary string | details string | severity list | affected list | references list | database_specific dict |
|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-g86w-v5vg-9gxf | 2021-08-25T22:01:25 | 2020-06-05T16:11:36 | [
"CVE-2020-5405"
] | Directory traversal attack in Spring Cloud Config | Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a direc... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.springframework.cloud:spring-cloud-config-server"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.1.0",
"fixed": null
},
{
"introduce... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5405"
},
{
"type": "PACKAGE",
"url": "https://github.com/spring-cloud/spring-cloud-config/spring-cloud-config-server"
},
{
"type": "WEB",
"url": "https://pivotal.io/security/cve-2020-5405"
}
] | {
"cwe_ids": [
"CWE-22",
"CWE-23"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2020-06-04T19:06:58",
"nvd_published_at": "2020-03-05T19:15:00"
} |
1.4.0 | GHSA-89gc-6cw6-4vch | 2022-04-26T18:36:08 | 2018-10-04T19:53:35 | [
"CVE-2016-9177"
] | Spark allows remote attackers to read arbitrary files via a .. (dot dot) in the URI | Directory traversal vulnerability in Spark 2.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.sparkjava:spark-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9177"
},
{
"type": "WEB",
"url": "https://github.com/perwendel/spark/issues/700"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:0868"
},
{
"type": "ADVISORY",
"url": "https://g... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:25:07",
"nvd_published_at": null
} |
1.4.0 | GHSA-5x3v-2gxr-59m2 | 2021-04-07T19:55:55 | 2020-07-01T17:26:15 | [
"CVE-2019-17572"
] | Directory traversal in Apache RocketMQ | In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users ... | [] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.rocketmq:rocketmq-broker"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "4.2.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17572"
},
{
"type": "WEB",
"url": "https://github.com/apache/rocketmq/issues/1637"
},
{
"type": "WEB",
"url": "https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552"
},
{
"typ... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2020-07-01T17:26:05",
"nvd_published_at": null
} |
1.4.0 | GHSA-2q4p-f6gf-mqr5 | 2023-08-31T18:52:56 | 2023-07-06T20:53:15 | [
"CVE-2023-41044"
] | Graylog server has partial path traversal vulnerability in Support Bundle feature | A partial path traversal vulnerability exists in Graylog's [Support Bundle](https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm) feature. The vulnerability is caused by incorrect user input validation in an HTTP API resource.
Thanks to weiweiwei9811 for reporting this vulnerability... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.graylog2:graylog2-server"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "5.1.0",
"fixed": null
},
{
"introduced": null,
"f... | [
{
"type": "WEB",
"url": "https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-2q4p-f6gf-mqr5"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41044"
},
{
"type": "WEB",
"url": "https://github.com/Graylog2/graylog2-server/commit/02b8792e6f4b8... | {
"cwe_ids": [
"CWE-22"
],
"severity": "LOW",
"github_reviewed": true,
"github_reviewed_at": "2023-07-06T20:53:15",
"nvd_published_at": "2023-08-31T18:15:09"
} |
1.4.0 | GHSA-h39x-m55c-v55h | 2022-04-26T21:49:59 | 2018-10-17T16:20:45 | [
"CVE-2018-12542"
] | Eclipse Vert.x does not properly neutralize '' (forward slashes) sequences that can resolve to an external location | In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the StaticHandler uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\' (forward slashes) sequences that can resolve to a location that is outside of that directory when running on Windows Opera... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "io.vertx:vertx-web"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "3.0.0",
"fixed": null
},
{
"introduced": null,
"fixed": "3.... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12542"
},
{
"type": "WEB",
"url": "https://github.com/vert-x3/vertx-web/issues/1025"
},
{
"type": "WEB",
"url": "https://github.com/vert-x3/vertx-web/commit/57a65dce6f4c5aa5e3ce7288685e7f3447eb8f3b"
},
{
... | {
"cwe_ids": [
"CWE-22"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:38:32",
"nvd_published_at": null
} |
1.4.0 | GHSA-jqh6-9574-5x22 | 2023-02-28T20:40:27 | 2023-01-23T22:05:28 | [
"CVE-2023-24057"
] | MITM based Zip Slip in `ca.uhn.hapi.fhir:org.hl7.fhir.core` | ### Impact
MITM can enable Zip-Slip.
### Vulnerability
#### Vulnerability 1: `Scanner.java`
There is no validation that the zip file being unpacked has entries that are not maliciously writing outside of the intended destination directory.
https://github.com/hapifhir/org.hl7.fhir.core/blob/8c43e21094af971303131efd0... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "ca.uhn.hapi.fhir:org.hl7.fhir.core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "WEB",
"url": "https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-xr8x-pxm6-prjg"
},
{
"type": "WEB",
"url": "https://github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-jqh6-9574-5x22"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/det... | {
"cwe_ids": [
"CWE-22"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-01-23T22:05:28",
"nvd_published_at": "2023-01-26T21:18:00"
} |
1.4.0 | GHSA-4wjq-69rc-8wcp | 2022-11-17T17:45:21 | 2019-05-02T15:21:34 | [
"CVE-2019-0194"
] | Path Traversal in Apache Camel | Apache Camel's File is vulnerable to directory traversal. Camel 2.21.0 to 2.21.3, 2.22.0 to 2.22.2, 2.23.0 and the unsupported Camel 2.x (2.19 and earlier) versions may be also affected. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.camel:camel-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.21.0",
"fixed": null
},
{
"introduced": null,
"f... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0194"
},
{
"type": "WEB",
"url": "https://github.com/apache/camel/pull/2700"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/camel"
},
{
"type": "WEB",
"url": "https://issues.apache.org/jira... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2019-05-02T15:00:07",
"nvd_published_at": "2019-04-30T22:29:00"
} |
1.4.0 | GHSA-gwrp-pvrq-jmwv | 2024-02-14T20:25:59 | 2021-04-26T16:04:00 | [
"CVE-2021-29425"
] | Path Traversal and Improper Input Validation in Apache Commons IO | In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "commons-io:commons-io"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "2.7... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29425"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org... | {
"cwe_ids": [
"CWE-20",
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2021-04-26T15:21:31",
"nvd_published_at": "2021-04-13T07:15:00"
} |
1.4.0 | GHSA-rcvx-rmvf-mxch | 2021-04-06T21:53:29 | 2022-02-09T22:19:44 | [
"CVE-2020-27219"
] | Cross-site Scripting in Eclipse Hawkbit | In all version of Eclipse Hawkbit prior to 0.3.0M7, the HTTP 404 (Not Found) JSON response body returned by the REST API may contain unsafe characters within the path attribute. Sending a POST request to a non existing resource will return the full path from the given URL unescaped to the client. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.eclipse.hawkbit:hawkbit-parent"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27219"
},
{
"type": "WEB",
"url": "https://github.com/eclipse/hawkbit/issues/1067"
},
{
"type": "WEB",
"url": "https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9"
},
{
"typ... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2021-04-06T21:53:29",
"nvd_published_at": "2021-01-14T23:15:00"
} |
1.4.0 | GHSA-6pqf-c99p-758v | 2023-06-30T20:41:50 | 2023-06-30T20:41:50 | [
"CVE-2023-36471"
] | org.xwiki.commons:xwiki-commons-xml's HTML sanitizer allows form elements in restricted | ### Impact
The HTML sanitizer that is included in XWiki since version 14.6RC1 allowed form and input HTML tags. In the context of XWiki, this allows an attacker without script right to either create forms that can be used for phishing attacks or also in the context of a sheet, the attacker could add an input like `{{h... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.commons:xwiki-commons-xml"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "14.6-rc-1",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-6pqf-c99p-758v"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36471"
},
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/commit/99484d48e899a68a1b6e33d... | {
"cwe_ids": [
"CWE-74",
"CWE-79"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-06-30T20:41:50",
"nvd_published_at": "2023-06-29T20:15:10"
} |
1.4.0 | GHSA-vpgf-fgm8-gxr2 | 2022-11-01T13:29:32 | 2022-10-28T12:00:33 | [
"CVE-2022-26884"
] | Apache DolphinScheduler vulnerable to Path Traversal | Users can read any files by log server, Apache DolphinScheduler users should upgrade to version 2.0.6 or higher. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.dolphinscheduler:dolphinscheduler"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26884"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/dolphinscheduler"
},
{
"type": "WEB",
"url": "https://github.com/apache/dolphinscheduler/releases/tag/2.0.6"
},
{
"type": "WEB",
"url":... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-10-31T19:37:13",
"nvd_published_at": "2022-10-28T08:15:00"
} |
1.4.0 | GHSA-jv74-f9pj-xp3f | 2022-11-17T19:14:08 | 2018-10-16T23:07:57 | [
"CVE-2018-8041"
] | Apache Camel's Mail is vulnerable to path traversal | Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 and 2.22.0 is vulnerable to path traversal. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.camel:camel-mail"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.20.0",
"fixed": null
},
{
"introduced": null,
"f... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8041"
},
{
"type": "WEB",
"url": "https://github.com/apache/camel/commit/4580e4d6c65cfd544c1791c824b5819477c583cc"
},
{
"type": "WEB",
"url": "https://github.com/apache/camel/commit/4f401c09d22c45c94fa97746dc3190... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:44:10",
"nvd_published_at": null
} |
1.4.0 | GHSA-qmfc-6www-fjqw | 2022-03-18T17:57:04 | 2022-03-18T17:57:04 | [
"CVE-2021-30181"
] | Code injection in Apache Dubbo | Apache Dubbo prior to 2.6.9 and 2.7.10 supports Script routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these rules, Dubbo customers use ScriptEngine and run the rule provided by t... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.alibaba:dubbo"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.5.0",
"fixed": null
},
{
"introduced": null,
"fixed": "2.6... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30181"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/re22410dc704a09bc7032ddf15140cf5e7df3e8ece390fc9032ff5587%40%3Cdev.dubbo.apache.org%3E"
}
] | {
"cwe_ids": [
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2021-06-02T20:15:20",
"nvd_published_at": "2021-06-01T14:15:00"
} |
1.4.0 | GHSA-683w-6h9j-57wq | 2021-09-01T22:41:27 | 2018-10-18T17:21:47 | [
"CVE-2016-10006"
] | Moderate severity vulnerability that affects org.owasp.antisamy:antisamy | In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.owasp.antisamy:antisamy"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed"... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10006"
},
{
"type": "WEB",
"url": "https://github.com/nahsra/antisamy/issues/2"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-683w-6h9j-57wq"
},
{
"type": "PACKAGE",
"url": "http... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:18:23",
"nvd_published_at": null
} |
1.4.0 | GHSA-rc2q-x9mf-w3vf | 2023-05-09T17:53:32 | 2022-11-19T21:30:25 | [
"CVE-2022-4065"
] | TestNG is vulnerable to Path Traversal | ### Impact
Affected by this vulnerability is the function `testngXmlExistsInJar` of the file `testng-core/src/main/java/org/testng/JarFileUtils.java` of the component `XML File Parser`.
The manipulation leads to path traversal only for `.xml`, `.yaml` and `.yml` files by default. The attack implies running an unsafe ... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.testng:testng"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "6.13",
"fixed": null
},
{
"introduced": null,
"fixed": "7.5.... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4065"
},
{
"type": "WEB",
"url": "https://github.com/cbeust/testng/pull/1596"
},
{
"type": "WEB",
"url": "https://github.com/cbeust/testng/pull/2806"
},
{
"type": "WEB",
"url": "https://github.com/tes... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-12-02T22:31:06",
"nvd_published_at": "2022-11-19T19:15:00"
} |
1.4.0 | GHSA-g8jj-899q-8x3j | 2021-05-13T19:52:04 | 2022-02-10T23:04:13 | [
"CVE-2020-13973"
] | Cross-site scripting in json-sanitizer | OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be ... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.mikesamuel:json-sanitizer"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixe... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13973"
},
{
"type": "WEB",
"url": "https://github.com/OWASP/json-sanitizer/pull/20"
}
] | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2021-05-13T19:52:04",
"nvd_published_at": "2020-06-09T04:15:00"
} |
1.4.0 | GHSA-3wfj-vh84-732p | 2023-12-20T19:05:58 | 2022-05-14T01:14:52 | [
"CVE-2014-3576"
] | Improper Neutralization of Special Elements used in an OS Command in Apache ActiveMQ | The processControlCommand function in broker/TransportConnection.java in Apache ActiveMQ before 5.11.0 allows remote attackers to cause a denial of service (shutdown) via a shutdown command. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.activemq:activemq-client"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3576"
},
{
"type": "WEB",
"url": "https://github.com/apache/activemq/commit/00921f22ff9a8792d7663ef8fadd4823402a6324"
},
{
"type": "WEB",
"url": "https://github.com/apache/activemq/commit/f07e6a53216f9388185ac2b3... | {
"cwe_ids": [
"CWE-78"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-07-07T22:40:47",
"nvd_published_at": "2015-08-14T18:59:00"
} |
1.4.0 | GHSA-8m5h-hrqm-pxm2 | 2022-04-27T21:09:43 | 2022-04-27T21:09:43 | [
"CVE-2022-23457"
] | Path traversal in the OWASP Enterprise Security API | ### Impact
The default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string represen... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.owasp.esapi:esapi"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "2.3... | [
{
"type": "WEB",
"url": "https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-8m5h-hrqm-pxm2"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23457"
},
{
"type": "WEB",
"url": "https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-04-27T21:09:43",
"nvd_published_at": "2022-04-25T20:15:00"
} |
1.4.0 | GHSA-f93p-f762-vr53 | 2021-06-15T17:28:04 | 2020-06-10T20:02:33 | [
"CVE-2019-17573"
] | Reflected Cross-Site Scripting in Apache CXF | By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is ... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.cxf:apache-cxf"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": ... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573"
},
{
"type": "WEB",
"url": "https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2020-06-09T19:27:28",
"nvd_published_at": "2020-01-16T18:15:00"
} |
1.4.0 | GHSA-jc35-q369-45pv | 2022-02-08T22:01:20 | 2022-02-09T22:51:56 | [
"CVE-2020-17530"
] | Remote code execution in Apache Struts | Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.struts:struts2-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.0.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17530"
},
{
"type": "WEB",
"url": "https://cwiki.apache.org/confluence/display/WW/S2-061"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20210115-0005"
},
{
"type": "WEB",
"url"... | {
"cwe_ids": [
"CWE-917",
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2021-04-09T21:42:05",
"nvd_published_at": "2020-12-11T02:15:00"
} |
1.4.0 | GHSA-w4m2-qmh3-2g8f | 2023-10-25T16:57:27 | 2023-10-19T18:30:30 | [
"CVE-2023-45277"
] | Yamcs Path Traversal vulnerability | Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.yamcs:yamcs"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "5.8.7"
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45277"
},
{
"type": "PACKAGE",
"url": "https://github.com/yamcs/yamcs"
},
{
"type": "WEB",
"url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7"
},
{
"type": "WEB",
"url": "https:/... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2023-10-19T20:02:23",
"nvd_published_at": "2023-10-19T17:15:10"
} |
1.4.0 | GHSA-9hhc-pj4w-w5rv | 2023-09-26T13:59:05 | 2023-03-01T17:38:56 | [
"CVE-2022-4137"
] | Keycloak Cross-site Scripting on OpenID connect login service | A reflected cross-site scripting (XSS) vulnerability was found in the `oob` OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.keycloak:keycloak-parent"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed... | [
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-9hhc-pj4w-w5rv"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4137"
},
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/pull/16774"
},
{
"type": "W... | {
"cwe_ids": [
"CWE-116",
"CWE-79"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2023-03-01T17:38:56",
"nvd_published_at": "2023-09-25T20:15:09"
} |
1.4.0 | GHSA-jpv3-g4cc-6vfx | 2024-03-14T22:09:43 | 2019-04-02T15:46:42 | [
"CVE-2019-0222"
] | Improper Control of Generation of Code ('Code Injection') in org.apache.activemq:activemq-client | In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.activemq:activemq-client"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "5.0.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222"
},
{
"type": "WEB",
"url": "https://github.com/apache/activemq/commit/98b9f2e"
},
{
"type": "WEB",
"url": "https://github.com/apache/activemq/commit/f78c0962ffb46fae3397eed6b7ec1e6e15045031"
},
{
"t... | {
"cwe_ids": [
"CWE-94"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:44:05",
"nvd_published_at": "2019-03-28T22:29:00"
} |
1.4.0 | GHSA-g8q8-fggx-9r3q | 2023-01-25T21:37:00 | 2022-12-13T19:44:56 | [
"CVE-2022-3782"
] | Keycloak vulnerable to path traversal via double URL encoding | Keycloak does not properly validate URLs included in a redirect. An attacker could construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain, or possibly conduct further attacks. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.keycloak:keycloak-parent"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed... | [
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-g8q8-fggx-9r3q"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3782"
},
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/pull/15982/commits/1987c942f527b9f3... | {
"cwe_ids": [
"CWE-177",
"CWE-22"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2022-12-13T19:44:56",
"nvd_published_at": "2023-01-13T06:15:00"
} |
1.4.0 | GHSA-r969-8v3h-23v9 | 2023-08-03T21:41:04 | 2023-07-29T09:30:15 | [
"CVE-2023-36542"
] | Apache NiFi Code Injection vulnerability | Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote re... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.nifi:nifi-cdc-mysql-bundle"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0.0.2",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36542"
},
{
"type": "WEB",
"url": "https://github.com/apache/nifi/commit/532578799c"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/nifi"
},
{
"type": "WEB",
"url": "https://issues.apache.o... | {
"cwe_ids": [
"CWE-94"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2023-07-31T22:03:10",
"nvd_published_at": "2023-07-29T08:15:48"
} |
1.4.0 | GHSA-cghx-9gcr-r42x | 2022-10-07T20:36:09 | 2021-01-29T18:12:54 | [
"CVE-2020-8570"
] | Path Traversal in the Java Kubernetes Client | Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "io.kubernetes:client-java"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": ... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8570"
},
{
"type": "WEB",
"url": "https://github.com/kubernetes-client/java/issues/1491"
},
{
"type": "WEB",
"url": "https://github.com/kubernetes-client/java/pull/1450"
},
{
"type": "WEB",
"url": "ht... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2021-01-22T18:25:27",
"nvd_published_at": "2021-01-21T17:15:00"
} |
1.4.0 | GHSA-98g7-rxmf-rrxm | 2022-09-08T14:19:24 | 2022-07-15T05:17:35 | [
"CVE-2021-4178"
] | fabric8 kubernetes-client vulnerable | fabric8 Kubernetes client had an arbitrary code execution flaw in versions 5.0.0-beta-1 and higher. Attackers could potentially insert malicious YAMLs due to misconfigured YAML parsing. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "io.fabric8:kubernetes-client"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "5.0.0-beta-1",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4178"
},
{
"type": "WEB",
"url": "https://github.com/fabric8io/kubernetes-client/issues/3653"
},
{
"type": "WEB",
"url": "https://github.com/fabric8io/kubernetes-client/commit/445103004d1ed3153d5abb272473451d0589... | {
"cwe_ids": [
"CWE-502",
"CWE-94"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-07-15T05:17:35",
"nvd_published_at": "2022-08-24T16:15:00"
} |
1.4.0 | GHSA-2rpm-4x8c-pvqg | 2022-06-30T14:43:07 | 2022-05-13T01:35:04 | [
"CVE-2018-1002202"
] | Improper Limitation of a Pathname to a Restricted Directory in Zip4j | zip4j before 1.3.3 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "net.lingala.zip4j:zip4j"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "1... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002202"
},
{
"type": "WEB",
"url": "https://github.com/snyk/zip-slip-vulnerability"
},
{
"type": "WEB",
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"type": "WEB",
"url": "https://sn... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-06-30T14:43:07",
"nvd_published_at": "2018-07-25T17:29:00"
} |
1.4.0 | GHSA-v84g-cf5j-xjqx | 2022-02-08T20:38:52 | 2022-02-08T00:00:34 | [
"CVE-2022-22931"
] | Path Traversal in Apache James Server | Apache James Server prior to version 3.6.2 contains a path traversal vulnerability. The fix for CVE-2021-40525 does not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to... | [] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.james:james-server"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixe... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22931"
},
{
"type": "WEB",
"url": "https://github.com/apache/james-project/pull/877"
},
{
"type": "WEB",
"url": "https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7"
... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-02-08T20:38:52",
"nvd_published_at": "2022-02-07T19:15:00"
} |
1.4.0 | GHSA-9654-pr4f-gh6m | 2023-12-15T22:19:57 | 2023-03-10T22:15:55 | [
"CVE-2023-28465"
] | HL7 FHIR Partial Path Zip Slip due to bypass of CVE-2023-24057 | ### Impact
Zip Slip protections implemented in CVE-2023-24057 (GHSA-jqh6-9574-5x22) can be bypassed due a partial path traversal vulnerability.
This issue allows a malicious actor to potentially break out of the `TerminologyCacheManager` cache directory. The impact is limited to sibling directories.
To demonstrate t... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "ca.uhn.hapi.fhir:org.hl7.fhir.core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "WEB",
"url": "https://github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-9654-pr4f-gh6m"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28465"
},
{
"type": "WEB",
"url": "https://github.com/hapifhir/org.hl7.fhir.core/pull/1162"
},
... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2023-03-10T22:15:55",
"nvd_published_at": "2023-12-12T17:15:07"
} |
1.4.0 | GHSA-vp37-2f9p-3vr3 | 2022-05-04T03:59:45 | 2022-04-23T00:03:04 | [
"CVE-2022-29577"
] | Cross-site Scripting in OWASP AntiSamy | AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue e... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.owasp.antisamy:antisamy"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed"... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29577"
},
{
"type": "WEB",
"url": "https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0"
},
{
"type": "PACKAGE",
"url": "https://github.com/nahsra/antisamy"
},
{
"type": "WEB... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-04-26T17:47:34",
"nvd_published_at": "2022-04-21T23:15:00"
} |
1.4.0 | GHSA-h28c-453m-h9xm | 2022-08-30T20:20:37 | 2022-08-19T00:00:20 | [
"CVE-2022-37422"
] | Path Traversal in Payara | Payara through 5.2022.2 allows directory traversal without authentication. This affects Payara Server, Payara Micro, and Payara Server Embedded. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "fish.payara.api:payara-bom"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed":... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37422"
},
{
"type": "WEB",
"url": "https://blog.payara.fish/august-community-5-release"
}
] | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-08-30T20:20:37",
"nvd_published_at": "2022-08-18T19:15:00"
} |
1.4.0 | GHSA-w6g3-v46q-5p28 | 2021-09-21T17:58:38 | 2018-10-17T15:49:58 | [
"CVE-2018-11762"
] | Moderate severity vulnerability that affects org.apache.tika:tika-core | In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tika:tika-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0.9",
"fixed": null
},
{
"introduced": null,
"fixed"... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11762"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-w6g3-v46q-5p28"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:59:47",
"nvd_published_at": null
} |
1.4.0 | GHSA-hfpg-gqjw-779m | 2022-06-30T18:25:33 | 2022-05-14T01:27:45 | [
"CVE-2018-1000129"
] | Cross-site Scripting in Jolokia agent | An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.jolokia:jolokia-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.3.7",
"fixed": null
},
{
"introduced": null,
"fixed... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000129"
},
{
"type": "WEB",
"url": "https://github.com/rhuss/jolokia/commit/5895d5c137c335e6b473e9dcb9baf748851bbc5f#diff-f19898247eddb55de6400489bff748ad"
},
{
"type": "WEB",
"url": "https://access.redhat.com/e... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-06-30T18:25:33",
"nvd_published_at": "2018-03-14T13:29:00"
} |
1.4.0 | GHSA-3pqg-4rqg-pg9g | 2022-05-04T04:00:41 | 2022-04-23T00:03:04 | [
"CVE-2022-28367"
] | Cross-site Scripting in OWASP AntiSamy | OWASP AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.owasp.antisamy:antisamy"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed"... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28367"
},
{
"type": "WEB",
"url": "https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae"
},
{
"type": "PACKAGE",
"url": "https://github.com/nahsra/antisamy"
},
{
"type": "WEB... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-04-26T19:45:44",
"nvd_published_at": "2022-04-21T23:15:00"
} |
1.4.0 | GHSA-q44v-xc3g-v7jq | 2022-11-17T19:41:38 | 2018-10-18T17:22:11 | [
"CVE-2017-14735"
] | OWASP AntiSamy Cross-site Scripting vulnerability | OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of : to construct a javascript: URL. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.owasp.antisamy:antisamy"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed"... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14735"
},
{
"type": "WEB",
"url": "https://github.com/nahsra/antisamy/issues/10"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-q44v-xc3g-v7jq"
},
{
"type": "PACKAGE",
"url": "htt... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:50:52",
"nvd_published_at": "2017-09-25T21:29:00"
} |
1.4.0 | GHSA-663w-2xp3-5739 | 2023-11-01T06:06:17 | 2023-10-25T21:02:49 | [
"CVE-2023-37908"
] | org.xwiki.rendering:xwiki-rendering-xml Improper Neutralization of Invalid Characters in Identifiers in Web Pages vulnerability | ### Impact
The cleaning of attributes during XHTML rendering, introduced in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid attribute names. This can be exploited, e.g., via the link syntax in any content that supports XWiki syntax like comments in XWiki:
```
... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.rendering:xwiki-rendering-xml"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "14.6-rc-1",
"fixed": null
},
{
"introduced": null,... | [
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-663w-2xp3-5739"
},
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-6gf5-c898-7rxp"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/C... | {
"cwe_ids": [
"CWE-79",
"CWE-83",
"CWE-86"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-10-25T21:02:49",
"nvd_published_at": "2023-10-25T18:17:28"
} |
1.4.0 | GHSA-g9fx-6j5c-grmw | 2023-05-25T13:24:03 | 2022-02-16T00:01:36 | [
"CVE-2022-25174"
] | Improper Neutralization of Special Elements used in an OS Command in Jenkins Pipeline: Shared Groovy Libraries Plugin | Jenkins Pipeline: Shared Groovy Libraries Plugin prior to 561.va_ce0de3c2d69, 2.21.1, and 2.18.1 uses the same checkout directories for distinct SCMs for Pipeline libraries, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.jenkins-ci.plugins.workflow:workflow-cps-global-lib"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "544.vff04fa68714d",
"fixed": null
},
{
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25174"
},
{
"type": "WEB",
"url": "https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/ace0de3c2d691662021ea10306eeb407da6b6365"
},
{
"type": "WEB",
"url": "https://github.com/CVEProject/cvelist/bl... | {
"cwe_ids": [
"CWE-78"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-06-20T22:48:09",
"nvd_published_at": "2022-02-15T17:15:00"
} |
1.4.0 | GHSA-pj84-qjm3-77mg | 2022-07-21T16:18:43 | 2022-02-16T00:01:36 | [
"CVE-2022-25175"
] | Jenkins Pipeline: Multibranch Plugin vulnerable to OS Command Injection | Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier uses distinct checkout directories per SCM for the readTrusted step, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.jenkins-ci.plugins.workflow:workflow-multibranch"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": ... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25175"
},
{
"type": "WEB",
"url": "https://github.com/jenkinsci/workflow-multibranch-plugin/commit/71c3f0a6ccdb2ba43f43686826b0d62160df85e8"
},
{
"type": "WEB",
"url": "https://www.jenkins.io/security/advisory/20... | {
"cwe_ids": [
"CWE-78"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-06-20T22:46:22",
"nvd_published_at": "2022-02-15T17:15:00"
} |
1.4.0 | GHSA-m3jr-cvhj-f35j | 2023-04-25T21:00:29 | 2023-04-12T20:38:17 | [
"CVE-2023-29201"
] | org.xwiki.commons:xwiki-commons-xml Cross-site Scripting vulnerability | ### Impact
The "restricted" mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1, only escaped `<script>` and `<style>`-tags but neither attributes that can be used to inject scripts nor other dangerous HTML tags like `<iframe>`. As a consequence, any code relying on this "restricted" mode for secur... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.commons:xwiki-commons-xml"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "4.2-milestone-1",
"fixed": null
},
{
"introduced": nul... | [
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-m3jr-cvhj-f35j"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29201"
},
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/commit/4a185e0594d90cd4916d60a... | {
"cwe_ids": [
"CWE-79"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-04-12T20:38:17",
"nvd_published_at": "2023-04-15T15:15:00"
} |
1.4.0 | GHSA-fp35-xrrr-3gph | 2022-11-02T21:45:12 | 2022-11-01T19:00:29 | [
"CVE-2022-34662"
] | Apache DolphinScheduler vulnerable to Path Traversal | When users add resources to the resource center with a relation path, this vulnerability will cause path traversal issues for logged-in users. Users should upgrade to version 3.0.0 to avoid this issue. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.dolphinscheduler:dolphinscheduler"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34662"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/dolphinscheduler"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/pbdzqf9ntxyvs4cr0x2dgk9zlf43btz8"
}
] | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-11-01T21:04:38",
"nvd_published_at": "2022-11-01T16:15:00"
} |
1.4.0 | GHSA-3gx9-37ww-9qw6 | 2022-08-11T21:37:05 | 2022-03-04T00:00:15 | [
"CVE-2022-22947"
] | Spring Cloud Gateway vulnerable to Code Injection when Gateway Actuator endpoint enabled, exposed, unsecured | In Spring Cloud Gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed, and unsecured. A remote attacker could make a maliciously crafted request resulting in arbitrary remote execution on the remote host. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.springframework.cloud:spring-cloud-gateway"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22947"
},
{
"type": "WEB",
"url": "https://tanzu.vmware.com/security/cve-2022-22947"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"type": "WEB",
"url": "htt... | {
"cwe_ids": [
"CWE-917",
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2022-03-04T21:06:22",
"nvd_published_at": "2022-03-03T22:15:00"
} |
1.4.0 | GHSA-3g5w-6pw7-6hrp | 2023-01-28T01:19:43 | 2023-01-27T12:30:29 | [
"CVE-2022-2712"
] | Path Traversal In Eclipse GlassFish | In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.glassfish.main.web:web"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "5.1.0",
"fixed": null
},
{
"introduced": null,
"fix... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2712"
},
{
"type": "WEB",
"url": "https://github.com/eclipse-ee4j/glassfish/pull/24077"
},
{
"type": "WEB",
"url": "https://bugs.eclipse.org/580502"
}
] | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2023-01-28T01:19:43",
"nvd_published_at": "2023-01-27T10:15:00"
} |
1.4.0 | GHSA-x3cq-8f32-5f63 | 2023-07-12T14:46:52 | 2023-07-06T21:15:04 | [
"CVE-2023-33246"
] | Apache RocketMQ may have remote code execution vulnerability when using update configuration function | For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.
Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update config... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.rocketmq:rocketmq-broker"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "5.0.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33246"
},
{
"type": "WEB",
"url": "https://github.com/apache/rocketmq/commit/9d411cf04a695e7a3f41036e8377b0aa544d754d"
},
{
"type": "WEB",
"url": "https://github.com/apache/rocketmq/commit/c3ada731405c5990c36bf58... | {
"cwe_ids": [
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-07-06T23:48:22",
"nvd_published_at": "2023-05-24T15:15:09"
} |
1.4.0 | GHSA-m9vj-44f3-78xw | 2022-06-03T15:46:13 | 2022-06-01T00:00:35 | [
"CVE-2022-23082"
] | Path traversal in CureKit | CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function `isFileOutsideDir` fails to sanitize the user input which may lead to path traversal. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "io.whitesource:curekit"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.0.1",
"fixed": null
},
{
"introduced": null,
"fixed":... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23082"
},
{
"type": "WEB",
"url": "https://github.com/whitesource/CureKit/commit/af35e870ed09411d2f1fae6db1b04598cd1a31b6"
},
{
"type": "PACKAGE",
"url": "https://github.com/whitesource/CureKit"
},
{
"typ... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-06-03T15:45:42",
"nvd_published_at": "2022-05-31T15:15:00"
} |
1.4.0 | GHSA-76qr-mmh8-cp8f | 2021-09-02T19:24:32 | 2018-10-19T16:56:00 | [
"CVE-2018-9159"
] | Moderate severity vulnerability that affects com.sparkjava:spark-core | In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.sparkjava:spark-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-9159"
},
{
"type": "WEB",
"url": "https://github.com/perwendel/spark/issues/981"
},
{
"type": "WEB",
"url": "https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668"
},
{
"type"... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:21:39",
"nvd_published_at": null
} |
1.4.0 | GHSA-pffw-p2q5-w6vh | 2022-09-17T00:13:09 | 2019-04-08T16:23:36 | [
"CVE-2019-0225"
] | Improper Limitation of a Pathname ('Path Traversal') in org.apache.jspwiki:jspwiki-war | A specially crafted url could be used to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, which could be used by an attacker to obtain registered users' details. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.jspwiki:jspwiki-war"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.9.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0225"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-pffw-p2q5-w6vh"
},
{
"type": "WEB",
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0225"
},
{
"type": "WEB",
"... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:49:01",
"nvd_published_at": null
} |
1.4.0 | GHSA-43fw-536j-w37j | 2023-10-25T16:57:42 | 2023-10-19T18:30:30 | [
"CVE-2023-45278"
] | Yamcs API Directory Traversal vulnerability | Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.yamcs:yamcs"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "5.8.7"
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45278"
},
{
"type": "PACKAGE",
"url": "https://github.com/yamcs/yamcs"
},
{
"type": "WEB",
"url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7"
},
{
"type": "WEB",
"url": "https:/... | {
"cwe_ids": [
"CWE-22"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-10-19T20:03:18",
"nvd_published_at": "2023-10-19T17:15:10"
} |
1.4.0 | GHSA-p9m8-27x8-rg87 | 2021-11-15T22:23:17 | 2021-11-15T23:27:11 | [
"CVE-2021-41269"
] | Critical vulnerability found in cron-utils | ### Impact
A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validat... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.cronutils:cron-utils"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "... | [
{
"type": "WEB",
"url": "https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41269"
},
{
"type": "WEB",
"url": "https://github.com/jmrozanec/cron-utils/issues/461"
},
{
"ty... | {
"cwe_ids": [
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2021-11-15T22:23:17",
"nvd_published_at": "2021-11-15T21:15:00"
} |
1.4.0 | GHSA-px42-mr8m-cpgh | 2023-08-07T20:27:41 | 2022-05-17T19:57:06 | [
"CVE-2014-3656"
] | JBoss KeyCloak Cross-site Scripting Vulnerability | If a JBoss Keycloak application was configured to use `*` as a permitted web origin in the Keycloak administrative console, crafted requests to the `login-status-iframe.html` endpoint could inject arbitrary Javascript into the generated HTML code via the "origin" query parameter, leading to a cross-site scripting (XSS)... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.keycloak:keycloak-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed":... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3656"
},
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/commit/63b41e2548cbc20bd3758e34a82d880e177bf24c"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/cve-2014-3656"
},
{
... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2023-08-07T20:27:41",
"nvd_published_at": "2019-12-10T14:15:00"
} |
1.4.0 | GHSA-9hr3-j9mc-xmq2 | 2022-05-20T21:17:03 | 2022-05-03T00:00:44 | [
"CVE-2022-25842"
] | Path Traversal in com.alibaba.oneagent:one-java-agent-plugin | All versions of package `com.alibaba.oneagent:one-java-agent-plugin` are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. `../../evil.exe`). The attacker can overwrite executable files and either invoke them remotely or... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:L"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.alibaba.oneagent:one-java-agent-plugin"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25842"
},
{
"type": "WEB",
"url": "https://github.com/alibaba/one-java-agent/pull/29"
},
{
"type": "WEB",
"url": "https://github.com/alibaba/one-java-agent/pull/29/commits/359603b63fc6c59d8b57e061c171954bab3433bf... | {
"cwe_ids": [
"CWE-22",
"CWE-29"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-05-20T21:17:03",
"nvd_published_at": "2022-05-01T16:15:00"
} |
1.4.0 | GHSA-vjw7-6gfq-6wf5 | 2021-04-22T22:08:15 | 2022-02-10T20:28:57 | [
"CVE-2019-17640"
] | Path Traversal in Eclipse Vert | In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0-milestone1, 4.0.0-milestone2, 4.0.0-milestone3, 4.0.0-milestone4, 4.0.0-milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working direct... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "io.vertx:vertx-web"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "3.0.0",
"fixed": null
},
{
"introduced": null,
"fixed": "3.... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17640"
},
{
"type": "WEB",
"url": "https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4"
},
{
"type": "WEB",
"url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=567416"
},
{
... | {
"cwe_ids": [
"CWE-22",
"CWE-23"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2021-04-22T22:08:15",
"nvd_published_at": "2020-10-15T21:15:00"
} |
1.4.0 | GHSA-3p62-6fjh-3p5h | 2023-07-07T21:47:57 | 2023-06-30T20:30:50 | [
"CVE-2022-4361"
] | Keycloak vulnerable to cross-site scripting when validating URI-schemes on SAML and OIDC | AssertionConsumerServiceURL is a Java implementation for SAML Service Providers (org.keycloak.protocol.saml). Affected versions of this package are vulnerable to Cross-site Scripting (XSS).
AssertionConsumerServiceURL allows XSS when sending a crafted SAML XML request. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.keycloak:keycloak-services"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fix... | [
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-3p62-6fjh-3p5h"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4361"
},
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/commit/a1cfe6e24e5b34792699a00b8b4a... | {
"cwe_ids": [
"CWE-79",
"CWE-81"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-06-30T20:30:50",
"nvd_published_at": "2023-07-07T20:15:09"
} |
1.4.0 | GHSA-pmhc-2g4f-85cg | 2023-09-15T18:29:37 | 2023-07-24T21:30:39 | [
"CVE-2023-34478"
] | Path Traversal in Apache Shiro | Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests.
Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+
| [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.shiro:shiro-web"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed":... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34478"
},
{
"type": "WEB",
"url": "https://github.com/apache/shiro/commit/c3ede3f94efb442acb0795714a022c2c121d1da0"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/shiro"
},
{
"type": "WEB",
... | {
"cwe_ids": [
"CWE-22"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-07-25T13:51:45",
"nvd_published_at": "2023-07-24T19:15:10"
} |
1.4.0 | GHSA-jpxj-vgq5-prjc | 2023-10-27T16:23:06 | 2022-01-13T00:01:03 | [
"CVE-2022-20617"
] | OS command execution vulnerability in Jenkins Docker Commons Plugin | Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.jenkins-ci.plugins:docker-commons"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20617"
},
{
"type": "WEB",
"url": "https://github.com/jenkinsci/docker-commons-plugin/commit/c069b79c31c5aa80a01b0c462f0dc6b41751f059"
},
{
"type": "PACKAGE",
"url": "https://github.com/jenkinsci/docker-commons-p... | {
"cwe_ids": [
"CWE-78"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-04-29T04:27:21",
"nvd_published_at": "2022-01-12T20:15:00"
} |
1.4.0 | GHSA-qwxx-xww6-8q8m | 2024-02-21T00:17:58 | 2024-02-20T12:30:58 | [
"CVE-2023-49109"
] | Remote Code Execution in Apache Dolphinscheduler | This issue affects Apache DolphinScheduler 3.0.0 before 3.2.1. We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue. | [] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.dolphinscheduler:dolphinscheduler"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "3.0.0",
"fixed": null
},
{
"introduced": null... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49109"
},
{
"type": "WEB",
"url": "https://github.com/apache/dolphinscheduler/pull/14991"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/dolphinscheduler"
},
{
"type": "WEB",
"url": "https:... | {
"cwe_ids": [
"CWE-94"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2024-02-21T00:17:58",
"nvd_published_at": "2024-02-20T10:15:07"
} |
1.4.0 | GHSA-xwf4-88xr-hx2j | 2022-11-03T19:12:07 | 2022-05-13T01:25:29 | [
"CVE-2016-5394"
] | Cross site scripting in Apache Sling | In the XSS Protection API module before 1.0.12 in Apache Sling, the encoding done by the XSSAPI.encodeForJSString() method is not restrictive enough and for some input patterns allows script tags to pass through unencoded, leading to potential XSS vulnerabilities. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.sling:org.apache.sling.xss"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5394"
},
{
"type": "WEB",
"url": "https://github.com/apache/sling-org-apache-sling-xss/commit/de32b144ad2be3367559f6184d560db42a220529"
},
{
"type": "WEB",
"url": "https://github.com/jensdietrich/xshady-release/t... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-11-03T19:12:07",
"nvd_published_at": "2017-07-19T15:29:00"
} |
1.4.0 | GHSA-xm2m-2q6h-22jw | 2023-06-21T13:48:41 | 2023-06-12T18:30:18 | [
"CVE-2023-34468"
] | Apache NiFi vulnerable to Code Injection | The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.
The resolution validates the Database URL and rejects H2 JDBC locations.
You are recom... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.nifi:nifi-dbcp-base"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0.0.2",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34468"
},
{
"type": "WEB",
"url": "https://github.com/apache/nifi/pull/7349"
},
{
"type": "WEB",
"url": "https://github.com/apache/nifi/commit/4faf3ea59895e7e153db3f8f61147ff70a254361"
},
{
"type": "PACKA... | {
"cwe_ids": [
"CWE-94"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2023-06-12T20:29:34",
"nvd_published_at": "2023-06-12T16:15:10"
} |
1.4.0 | GHSA-qp5m-c3m9-8q2p | 2022-08-06T05:47:04 | 2022-08-06T05:47:04 | [
"CVE-2022-31194"
] | JSPUI vulnerable to path traversal in submission (resumable) upload | ### Impact
The JSPUI resumable upload implementations in SubmissionController and FileUploadRequest are vulnerable to multiple path traversal attacks, allowing an attacker to create files/directories anywhere on the server writable by the Tomcat/DSpace user, by modifying some request parameters during submission. This ... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.dspace:dspace-jspui"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "4.0",
"fixed": null
},
{
"introduced": null,
"fixed": ... | [
{
"type": "WEB",
"url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-qp5m-c3m9-8q2p"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31194"
},
{
"type": "WEB",
"url": "https://github.com/DSpace/DSpace/commit/7569c6374aefeafb996e202cf8d631020ed... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-08-06T05:47:04",
"nvd_published_at": "2022-08-01T21:15:00"
} |
1.4.0 | GHSA-qvq8-cw7f-m7m4 | 2023-06-03T00:39:55 | 2023-05-25T09:30:25 | [
"CVE-2022-46907"
] | Apache JSPWiki vulnerable to cross-site scripting on several plugins | A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.0 or later.
| [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.jspwiki:jspwiki-main"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fi... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46907"
},
{
"type": "WEB",
"url": "https://github.com/apache/jspwiki/commit/0b9a0149032170063f22d65e335dfd317db815ea"
},
{
"type": "WEB",
"url": "https://github.com/apache/jspwiki/commit/46e1ef7a595ca5cabf5ef1841... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2023-05-25T17:38:08",
"nvd_published_at": "2023-05-25T07:15:08"
} |
1.4.0 | GHSA-x37v-36wv-6v6h | 2023-04-20T20:55:02 | 2023-04-20T20:55:02 | [
"CVE-2023-29528"
] | Cross-site Scripting in org.xwiki.commons:xwiki-commons-xml | ### Impact
The "restricted" mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1 and massively improved in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid HTML comments. As a consequence, any code relying on this "restricted" mode for securit... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.commons:xwiki-commons-xml"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "4.2-milestone-1",
"fixed": null
},
{
"introduced": nul... | [
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-x37v-36wv-6v6h"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29528"
},
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/commit/8ff1a9d7e5d7b45b690134a... | {
"cwe_ids": [
"CWE-79"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-04-20T20:55:02",
"nvd_published_at": "2023-04-20T18:15:07"
} |
1.4.0 | GHSA-wh3p-fphp-9h2m | 2023-08-03T17:59:29 | 2023-07-25T17:20:43 | [
"CVE-2023-37460"
] | Arbitrary File Creation in AbstractUnArchiver | ### Summary
Using AbstractUnArchiver for extracting an archive might lead to an arbitrary file creation and possibly remote code execution.
### Description
When extracting an archive with an entry that already exists in the destination directory as a symbolic link whose target does not exist - the resolveFile() funct... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.codehaus.plexus:plexus-archiver"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "WEB",
"url": "https://github.com/codehaus-plexus/plexus-archiver/security/advisories/GHSA-wh3p-fphp-9h2m"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37460"
},
{
"type": "WEB",
"url": "https://github.com/codehaus-plexus/plexus-archiver/commit... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2023-07-25T17:20:43",
"nvd_published_at": "2023-07-25T20:15:13"
} |
1.4.0 | GHSA-hp5r-mhgp-56c9 | 2021-08-04T20:00:07 | 2019-06-06T15:29:29 | [
"CVE-2019-10078"
] | Cross-site Scriptin in JSPWiki | A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.jspwiki:jspwiki-war"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.9.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10078"
},
{
"type": "WEB",
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10078"
}
] | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2019-05-29T19:05:49",
"nvd_published_at": "2019-05-20T21:29:00"
} |
1.4.0 | GHSA-cj6j-32rg-45r2 | 2021-08-04T19:54:08 | 2019-06-06T15:29:25 | [
"CVE-2019-10077"
] | Cross-site Scripting in JSPWiki | A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.jspwiki:jspwiki-war"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.9.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10077"
},
{
"type": "WEB",
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10077"
}
] | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2019-05-29T19:05:35",
"nvd_published_at": "2019-05-20T21:29:00"
} |
1.4.0 | GHSA-89r3-rcpj-h7w6 | 2023-03-06T20:46:38 | 2019-11-18T17:19:03 | [
"CVE-2019-0207"
] | Path traversal attack on Windows platforms | Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tapestry:tapestry-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "5.4.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0207"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/765be3606d865de513f6df9288842c3cf58b09a987c617a535f2b99d@%3Cusers.tapestry.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.or... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2019-11-18T14:18:47",
"nvd_published_at": "2019-09-16T17:15:00"
} |
1.4.0 | GHSA-77hf-23pq-2g7c | 2022-11-03T22:19:38 | 2022-06-16T00:00:26 | [
"CVE-2022-33140"
] | Code injection in Apache NiFi and NiFi Registry | The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration.... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.nifi.registry:nifi-registry-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0.6.0",
"fixed": null
},
{
"introduced": null,... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-33140"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/nifi"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/bzs2pcdjsdrh5039oslmfr9mbs9qqdhr"
},
{
"type": "WEB",
"url": "https:/... | {
"cwe_ids": [
"CWE-74",
"CWE-78"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-06-17T21:49:10",
"nvd_published_at": "2022-06-15T15:15:00"
} |
1.4.0 | GHSA-gjfx-9wx3-j6r7 | 2023-08-16T23:00:39 | 2022-05-13T01:24:34 | [
"CVE-2011-4367"
] | Apache MyFaces Vulnerable to Path Traversal | Multiple directory traversal vulnerabilities in MyFaces JavaServer Faces (JSF) in Apache MyFaces Core 2.0.x before 2.0.12 and 2.1.x before 2.1.6 allow remote attackers to read arbitrary files via a `..` (dot dot) in the (1) ln parameter to `faces/javax.faces.resource/web.xml` or (2) the `PATH_INFO` to `faces/javax.face... | [] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.myfaces.core:myfaces-impl"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.0.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4367"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73100"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20120213042504/http://www.securityfocus.com/bid/51939"
},
... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-11-02T00:42:02",
"nvd_published_at": "2014-06-19T14:55:00"
} |
1.4.0 | GHSA-h6p6-fc4w-cqhx | 2022-07-06T21:05:00 | 2022-05-17T04:15:16 | [
"CVE-2014-7816"
] | Improper Limitation of a Pathname to a Restricted Directory in JBoss Undertow | Directory traversal vulnerability in JBoss Undertow 1.0.x before 1.0.17, 1.1.x before 1.1.0.CR5, and 1.2.x before 1.2.0.Beta3, when running on Windows, allows remote attackers to read arbitrary files via a .. (dot dot) in a resource URI. | [] | [
{
"package": {
"ecosystem": "Maven",
"name": "io.undertow:undertow-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.0.0",
"fixed": null
},
{
"introduced": null,
"fixe... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7816"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157478"
},
{
"type": "WEB",
"url": "https://issues.jboss.org/browse/UNDERTOW-338"
},
{
"type": "WEB",
"url": "https://iss... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-07-06T21:05:00",
"nvd_published_at": "2014-12-01T15:59:00"
} |
1.4.0 | GHSA-wc73-w5r9-x9pc | 2021-10-08T22:07:01 | 2021-10-12T16:41:36 | [
"CVE-2020-29204"
] | Cross-site Scripting in XXL-JOB | XXL-JOB 2.2.0 allows Stored XSS (in Add User) to bypass the 20-character limit via xxl-job-admin/src/main/java/com/xxl/job/admin/controller/UserController.java. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.xuxueli:xxl-job-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29204"
},
{
"type": "WEB",
"url": "https://github.com/xuxueli/xxl-job/issues/2083"
},
{
"type": "WEB",
"url": "https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e"
},
{
"typ... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2021-10-08T22:07:01",
"nvd_published_at": "2020-12-27T06:15:00"
} |
1.4.0 | GHSA-599f-7c49-w659 | 2022-10-17T17:34:05 | 2022-10-13T19:00:17 | [
"CVE-2022-42889"
] | Arbitrary code execution in Apache Commons Text | Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.commons:commons-text"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.5",
"fixed": null
},
{
"introduced": null,
"... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42889"
},
{
"type": "WEB",
"url": "https://arxiv.org/pdf/2306.05534"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/commons-text"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread... | {
"cwe_ids": [
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2022-10-13T20:22:17",
"nvd_published_at": "2022-10-13T13:15:00"
} |
1.4.0 | GHSA-cxx2-fp39-rf3r | 2021-08-04T19:53:10 | 2019-06-06T15:29:22 | [
"CVE-2019-10076"
] | Cross-Site Scripting in JSPWiki | A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.jspwiki:jspwiki-war"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.9.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10076"
},
{
"type": "WEB",
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10076"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d19... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2019-05-29T19:05:23",
"nvd_published_at": null
} |
1.4.0 | GHSA-m8p2-495h-ccmh | 2022-02-08T22:07:14 | 2020-01-08T17:01:52 | [
"CVE-2019-10219"
] | The SafeHtml annotation in Hibernate-Validator does not properly guard against XSS attacks | A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.hibernate.validator:hibernate-validator"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10219"
},
{
"type": "WEB",
"url": "https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee"
},
{
"type": "WEB",
"url": "https://github.com/hibernate/hibernate-validator/co... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2020-01-08T17:00:14",
"nvd_published_at": "2019-11-08T15:15:00"
} |
1.4.0 | GHSA-hcxq-x77q-3469 | 2022-06-30T15:19:51 | 2022-05-13T01:35:03 | [
"CVE-2018-1002200"
] | Improper Limitation of a Pathname to a Restricted Directory in plexus-archiver | plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.codehaus.plexus:plexus-archiver"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002200"
},
{
"type": "WEB",
"url": "https://github.com/codehaus-plexus/plexus-archiver/pull/87"
},
{
"type": "WEB",
"url": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-06-30T15:19:51",
"nvd_published_at": "2018-07-25T17:29:00"
} |
1.4.0 | GHSA-6phf-6h5g-97j2 | 2023-06-02T22:05:04 | 2023-05-23T20:07:58 | [
"CVE-2023-32697"
] | Sqlite-jdbc vulnerable to remote code execution when JDBC url is attacker controlled | ## Summary
Sqlite-jdbc addresses a remote code execution vulnerability via JDBC URL.
## Impacted versions :
3.6.14.1-3.41.2.1
## References
https://github.com/xerial/sqlite-jdbc/releases/tag/3.41.2.2 | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.xerial:sqlite-jdbc"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "3.6.14.1",
"fixed": null
},
{
"introduced": null,
"fixe... | [
{
"type": "WEB",
"url": "https://github.com/xerial/sqlite-jdbc/security/advisories/GHSA-6phf-6h5g-97j2"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32697"
},
{
"type": "PACKAGE",
"url": "https://github.com/xerial/sqlite-jdbc"
},
{
"type": "WEB",... | {
"cwe_ids": [
"CWE-94"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2023-05-23T20:07:58",
"nvd_published_at": "2023-05-23T23:15:09"
} |
1.4.0 | GHSA-544x-2jx9-4pfg | 2022-02-04T13:51:18 | 2022-01-28T22:25:03 | [
"CVE-2022-22932"
] | Path traversal in Apache Karaf | Apache Karaf obr:* commands and run goal on the karaf-maven-plugin have partial path traversal which allows to break out of expected folder. The risk is low as obr:* commands are not very used and the entry is set by user. This has been fixed in revision: https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4 https:... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.karaf:apache-karaf"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "4.3.0",
"fixed": null
},
{
"introduced": null,
"... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22932"
},
{
"type": "WEB",
"url": "https://github.com/apache/karaf/pull/1485"
},
{
"type": "WEB",
"url": "https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4"
},
{
"type": "WEB",
"url": "https:/... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-01-27T23:10:36",
"nvd_published_at": "2022-01-26T11:15:00"
} |
1.4.0 | GHSA-4wm8-c2vv-xrpq | 2022-08-06T05:46:27 | 2022-08-06T05:46:27 | [
"CVE-2022-31192"
] | JSPUI Possible Cross Site Scripting in "Request a Copy" Feature | ### Impact
The JSPUI "Request a Copy" feature does not properly escape values submitted and stored from the "Request a Copy" form. This means that item requests could be vulnerable to XSS attacks. This vulnerability only impacts the JSPUI.
_This vulnerability does NOT impact the XMLUI or 7.x._
### Patches
_DSpace ... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.dspace:dspace-jspui"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "5.0",
"fixed": null
},
{
"introduced": null,
"fixed": ... | [
{
"type": "WEB",
"url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-4wm8-c2vv-xrpq"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31192"
},
{
"type": "WEB",
"url": "https://github.com/DSpace/DSpace/commit/28eb8158210d41168a62ed5f9e044f75451... | {
"cwe_ids": [
"CWE-79"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-08-06T05:46:27",
"nvd_published_at": "2022-08-01T21:15:00"
} |
1.4.0 | GHSA-vw2c-5wph-v92r | 2023-12-21T22:53:21 | 2022-05-13T01:09:20 | [
"CVE-2016-6812"
] | Improper Neutralization of Input During Web Page Generation in Apache CXF | The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the base URL using the current HttpServletRequest. The calculated base URL i... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.cxf:cxf-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "3... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6812"
},
{
"type": "WEB",
"url": "https://github.com/apache/cxf/commit/1be97cb13aef121b799b1be4d9793c0e8b925a12"
},
{
"type": "WEB",
"url": "https://github.com/apache/cxf/commit/1f824d8039c7a42a4aa46f844e6c800e11... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-07-06T19:46:03",
"nvd_published_at": "2017-08-10T16:29:00"
} |
1.4.0 | GHSA-6gf5-c898-7rxp | 2023-05-11T20:37:30 | 2023-05-11T20:37:30 | [
"CVE-2023-32070"
] | Improper Neutralization of Script in Attributes in XWiki (X)HTML renderers | ### Impact
HTML rendering didn't check for dangerous attributes/attribute values. This allowed cross-site scripting (XSS) attacks via attributes and link URLs, e.g., supported in XWiki syntax.
### Patches
This has been patched in XWiki 14.6 RC1.
### Workarounds
There are no known workarounds apart from upgrading to ... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.rendering:xwiki-rendering-syntax-xhtml"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null... | [
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-6gf5-c898-7rxp"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32070"
},
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-rendering/commit/c40e2f5f9482ec6c3e7... | {
"cwe_ids": [
"CWE-79",
"CWE-83"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-05-11T20:37:30",
"nvd_published_at": "2023-05-10T18:15:10"
} |
1.4.0 | GHSA-g6ph-x5wf-g337 | 2023-10-02T22:07:45 | 2023-09-25T21:30:26 | [
"CVE-2022-4244"
] | plexus-codehaus vulnerable to directory traversal | A flaw was found in plexus-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with dot-dot-slash (`../`) sequences and their variations or by using absolute file paths, it may be possible to access arbitrar... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.codehaus.plexus:plexus-utils"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"f... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4244"
},
{
"type": "WEB",
"url": "https://github.com/codehaus-plexus/plexus-utils/issues/4"
},
{
"type": "WEB",
"url": "https://github.com/codehaus-plexus/plexus-utils/commit/33a2853df8185b4519b1b8bfae284f0339261... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2023-09-26T17:59:40",
"nvd_published_at": "2023-09-25T20:15:10"
} |
1.4.0 | GHSA-wqfh-9m4g-7x6x | 2024-03-14T21:56:27 | 2022-02-09T22:14:58 | [
"CVE-2020-11998"
] | Remote code execution in Apache ActiveMQ | A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack - A remote client could create a javax.management.loading.MLet MBean and use ... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.activemq:activemq-parent"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "5.15.12",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11998"
},
{
"type": "WEB",
"url": "https://github.com/apache/activemq/commit/0d6e5f2"
},
{
"type": "WEB",
"url": "https://github.com/apache/activemq/commit/88b78d0"
},
{
"type": "WEB",
"url": "https:/... | {
"cwe_ids": [
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2021-04-05T23:02:39",
"nvd_published_at": "2020-09-10T19:15:00"
} |
1.4.0 | GHSA-fmr4-w67p-vh8x | 2023-02-13T20:36:36 | 2018-10-19T16:55:35 | [
"CVE-2018-1047"
] | Improper Input Validation in org.wildfly:wildfly-undertow | A flaw was found in Wildfly 9.x. A path traversal vulnerability through the org.wildfly.extension.undertow.deployment.ServletResourceManager.getResource method could lead to information disclosure of arbitrary local files. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.wildfly:wildfly-undertow"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1047"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1247"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1248"
},
{
"type": "WEB",
"url": "https://acce... | {
"cwe_ids": [
"CWE-20",
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T20:49:32",
"nvd_published_at": "2018-01-24T23:29:00"
} |
1.4.0 | GHSA-4mmh-5vw7-rgvj | 2022-08-18T19:07:58 | 2022-08-18T19:07:58 | [
"CVE-2022-36007"
] | Venice vulnerable to Partial Path Traversal issue within the functions `load-file` and `load-resource` | ### Impact
A partial path traversal issue exists within the functions `load-file` and `load-resource`. These functions can be limited to load files from a list of load paths.
Assuming Venice has been configured with the load paths: `[ "/Users/foo/resources" ]`
When passing **relative** paths to these two vulnerable ... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.github.jlangch:venice"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": ... | [
{
"type": "WEB",
"url": "https://github.com/jlangch/venice/security/advisories/GHSA-4mmh-5vw7-rgvj"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36007"
},
{
"type": "WEB",
"url": "https://github.com/jlangch/venice/commit/215ae91bb964013b0a2d70718a692832d... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-08-18T19:07:58",
"nvd_published_at": "2022-08-15T11:21:00"
} |
1.4.0 | GHSA-hw6x-2qwv-rxr7 | 2022-06-28T22:28:13 | 2022-05-24T16:55:58 | [
"CVE-2019-10392"
] | Improper Neutralization of Special Elements used in an OS Command in Jenkins Git Client Plugin | Jenkins Git Client Plugin 2.8.4 and earlier did not properly restrict values passed as URL argument to an invocation of 'git ls-remote', resulting in OS command injection. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.jenkins-ci.plugins:git-client"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10392"
},
{
"type": "WEB",
"url": "https://github.com/jenkinsci/git-client-plugin/commit/899123fa2eb9dd2c37137aae630c47c6be6b4b02"
},
{
"type": "WEB",
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECU... | {
"cwe_ids": [
"CWE-78"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-06-28T22:28:13",
"nvd_published_at": "2019-09-12T14:15:00"
} |
1.4.0 | GHSA-ff2w-wm48-jhqj | 2024-02-21T00:21:46 | 2024-02-20T12:31:00 | [
"CVE-2023-51770"
] | Arbitrary File Read Vulnerability in Apache Dolphinscheduler | Arbitrary File Read Vulnerability in Apache Dolphinscheduler.
This issue affects Apache DolphinScheduler: before 3.2.1.
We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue. | [] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.dolphinscheduler:dolphinscheduler"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51770"
},
{
"type": "WEB",
"url": "https://github.com/apache/dolphinscheduler/pull/15433"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/dolphinscheduler"
},
{
"type": "WEB",
"url": "https:... | {
"cwe_ids": [
"CWE-94"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2024-02-21T00:21:46",
"nvd_published_at": "2024-02-20T10:15:08"
} |
1.4.0 | GHSA-76qj-9gwh-pvv3 | 2023-02-06T16:45:45 | 2023-01-26T21:30:19 | [
"CVE-2023-24422"
] | Sandbox bypass in Jenkins Script Security Plugin | A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.jenkins-ci.plugins:script-security"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24422"
},
{
"type": "WEB",
"url": "https://github.com/jenkinsci/script-security-plugin/commit/4880bbe905a6783d80150c8b881d0127430d4a73"
},
{
"type": "PACKAGE",
"url": "https://github.com/jenkinsci/script-security... | {
"cwe_ids": [
"CWE-78"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2023-01-27T01:05:51",
"nvd_published_at": "2023-01-26T21:18:00"
} |
1.4.0 | GHSA-8p8g-f9vg-r7xr | 2022-09-14T22:25:15 | 2018-12-21T17:48:19 | [
"CVE-2018-1000850"
] | Directory Traversal vulnerability in Square Retrofit | Square Retrofit versions from (including) 2.0 to 2.5.0 (excluding) contain a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter. By manipulating the URL an attacker could add or delete resources otherwise unavailable to her. This attack appears to be exploitable via an encoded path param... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.squareup.retrofit2:retrofit"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.0.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000850"
},
{
"type": "WEB",
"url": "https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982"
},
{
"type": "WEB",
"url": "https://access.redhat.com... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:26:16",
"nvd_published_at": null
} |
1.4.0 | GHSA-hwpc-8xqv-jvj4 | 2022-10-25T20:37:12 | 2021-03-22T23:28:38 | [
"CVE-2021-21345"
] | XStream is vulnerable to a Remote Command Execution attack | ### Impact
The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.thoughtworks.xstream:xstream"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"f... | [
{
"type": "WEB",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21345"
},
{
"type": "WEB",
"url": "https://x-stream.github.io/security.html#workaround"
},
{
"type"... | {
"cwe_ids": [
"CWE-78",
"CWE-94"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2021-03-22T23:24:01",
"nvd_published_at": "2021-03-23T00:15:00"
} |
1.4.0 | GHSA-36p3-wjmg-h94x | 2022-06-01T22:15:49 | 2022-03-31T18:30:50 | [
"CVE-2022-22965"
] | Remote Code Execution in Spring Framework | Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`.
## Impact
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run o... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.springframework:spring-beans"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"f... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22965"
},
{
"type": "WEB",
"url": "https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/... | {
"cwe_ids": [
"CWE-74",
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2022-03-31T18:30:50",
"nvd_published_at": "2022-04-01T23:15:00"
} |
1.4.0 | GHSA-3rx2-x6mx-grj3 | 2021-08-17T22:35:54 | 2019-10-11T18:41:54 | [
"CVE-2019-10089"
] | Cross-site scripting in Apache JSPWiki | On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.jspwiki:jspwiki-war"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.9.0",
"fixed": null
},
{
"introduced": null,
... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10089"
},
{
"type": "WEB",
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089"
}
] | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2019-09-25T12:33:32",
"nvd_published_at": "2019-09-23T15:15:00"
} |
1.4.0 | GHSA-8rmh-55h4-93h5 | 2022-08-11T17:03:11 | 2022-08-06T05:48:56 | [
"CVE-2022-31195"
] | DSpace ItemImportService API Vulnerable to Path Traversal in Simple Archive Format Package Import | ### Impact
ItemImportServiceImpl is vulnerable to a path traversal vulnerability. This means a malicious SAF (simple archive format) package could cause a file/directory to be created anywhere the Tomcat/DSpace user can write to on the server. However, this path traversal vulnerability is only possible by a user with ... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.dspace:dspace-api"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "4.0",
"fixed": null
},
{
"introduced": null,
"fixed": "5... | [
{
"type": "WEB",
"url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-8rmh-55h4-93h5"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31195"
},
{
"type": "WEB",
"url": "https://github.com/DSpace/DSpace/commit/56e76049185bbd87c994128a9d77735ad7a... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-08-06T05:48:56",
"nvd_published_at": "2022-08-01T21:15:00"
} |
1.4.0 | GHSA-q77q-vx4q-xx6q | 2022-05-10T15:44:45 | 2022-04-27T21:09:46 | [
"CVE-2022-24891"
] | Cross-site Scripting in org.owasp.esapi:esapi | ### Impact
There is a potential for an XSS vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause URLs with the "javascript:" scheme to NOT be sanitized. See the reference below for full details.
### Patches
Patched in ESAPI 2.3.0... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.owasp.esapi:esapi"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "2.3... | [
{
"type": "WEB",
"url": "https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-q77q-vx4q-xx6q"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24891"
},
{
"type": "PACKAGE",
"url": "https://github.com/ESAPI/esapi-java-legacy"
},
{
"typ... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-04-27T21:09:46",
"nvd_published_at": "2022-04-27T21:15:00"
} |
1.4.0 | GHSA-65hj-9ppw-77xc | 2022-12-21T18:16:26 | 2022-12-01T06:30:26 | [
"CVE-2022-44262"
] | ff4j is vulnerable to Remote Code Execution (RCE) | ff4j 1.8.1 is vulnerable to Remote Code Execution (RCE). This issue has been patched in version 1.9. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.ff4j:ff4j-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.8.1",
"fixed": null
},
{
"introduced": null,
"fixed": "1.... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44262"
},
{
"type": "WEB",
"url": "https://github.com/ff4j/ff4j/issues/624"
},
{
"type": "WEB",
"url": "https://github.com/ff4j/ff4j/commit/62d03140f3bfbd380d0f4b4e5a94dcb8baa9d9c6"
},
{
"type": "PACKAGE"... | {
"cwe_ids": [
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2022-12-05T22:13:55",
"nvd_published_at": "2022-12-01T05:15:00"
} |
1.4.0 | GHSA-4gr7-qw2q-jxh6 | 2022-03-22T21:37:08 | 2022-03-12T00:00:27 | [
"CVE-2021-44667"
] | Cross-site Scripting in Nacos | A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.alibaba.nacos:nacos-common"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fix... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44667"
},
{
"type": "WEB",
"url": "https://github.com/alibaba/nacos/issues/7359"
},
{
"type": "WEB",
"url": "https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5"
},
{
"type": ... | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-03-14T23:25:35",
"nvd_published_at": "2022-03-11T19:15:00"
} |
1.4.0 | GHSA-qcf3-9vmh-xw4r | 2022-06-30T15:17:37 | 2022-05-13T01:30:44 | [
"CVE-2018-1002201"
] | Improper Limitation of a Pathname to a Restricted Directory in zt-zip | zt-zip before 1.13 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.zeroturnaround:zt-zip"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": ... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002201"
},
{
"type": "WEB",
"url": "https://github.com/zeroturnaround/zt-zip/commit/759b72f33bc8f4d69f84f09fcb7f010ad45d6fff"
},
{
"type": "WEB",
"url": "https://github.com/snyk/zip-slip-vulnerability"
},
{
... | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-06-30T15:17:37",
"nvd_published_at": "2018-07-25T17:29:00"
} |
1.4.0 | GHSA-xgqr-5wqw-9fpv | 2022-11-04T20:44:39 | 2022-11-03T19:00:26 | [
"CVE-2022-32287"
] | Apache UIMA Path Traversal vulnerability | A relative path traversal vulnerability in a FileUtil class used by the PEAR management component of Apache UIMA allows an attacker to create files outside the designated target directory using carefully crafted ZIP entry names. This issue affects Apache UIMA Apache UIMA version 3.3.0 and prior versions. Note that PEAR... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.uima:uimaj-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed":... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32287"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/57vk0d79j94d0lk0vol8xn935yv1shdd"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2022/11/03/4"
}
] | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-11-03T21:11:17",
"nvd_published_at": "2022-11-03T12:15:00"
} |
1.4.0 | GHSA-5xm9-rf63-wj7h | 2022-07-13T17:56:38 | 2022-05-17T05:18:15 | [
"CVE-2011-2732"
] | Improper Control of Generation of Code in Spring Security | CRLF injection vulnerability in the logout functionality in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the spring-security-redirect parameter. | [] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.springframework.security:spring-security-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": nul... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2732"
},
{
"type": "PACKAGE",
"url": "https://github.com/spring-projects/spring-security"
},
{
"type": "WEB",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814"
},
{
"type": "WEB",
"url"... | {
"cwe_ids": [
"CWE-94"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2022-07-13T17:56:38",
"nvd_published_at": "2012-12-05T17:55:00"
} |
1.4.0 | GHSA-p2f7-9cv7-jjf6 | 2022-09-19T20:25:28 | 2022-09-12T00:00:33 | [
"CVE-2022-26049"
] | Goomph before 3.37.2 allows malicious zip file to write contents to arbitrary locations | This affects the package com.diffplug.gradle:goomph before 3.37.2. It allows a malicious zip file to potentially break out of the expected destination directory, writing contents into arbitrary locations on the file system. Overwriting certain files/directories could allow an attacker to achieve remote code execution o... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.diffplug.gradle:goomph"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed":... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26049"
},
{
"type": "WEB",
"url": "https://github.com/diffplug/goomph/pull/198"
},
{
"type": "WEB",
"url": "https://github.com/diffplug/goomph/commit/25f04f67ba62d9a14104bee13a0a0f2517afb8c8"
},
{
"type":... | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-09-15T03:28:31",
"nvd_published_at": "2022-09-11T14:15:00"
} |
1.4.0 | GHSA-rrpm-pj7p-7j9q | 2022-09-14T01:00:57 | 2018-10-18T18:05:34 | [
"CVE-2018-1260"
] | Spring Security OAuth vulnerable to remote code execution (RCE) | Spring Security OAuth versions prior to 2.3.3,prior to 2.2.2, prior to 2.1.2, and prior to 2.0.15 contain a remote code execution vulnerability. An attacker can craft an authorization request to the authorization endpoint that can lead to remote code execution when the resource owner is forwarded to the approval endpo... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.springframework.security.oauth:spring-security-oauth2"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.3.0",
"fixed": null
},
{
"intr... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1260"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1809"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:2939"
},
{
"type": "ADVISORY",
"url": "https:/... | {
"cwe_ids": [
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:55:47",
"nvd_published_at": null
} |
1.4.0 | GHSA-jq84-6fmm-6qv6 | 2022-12-29T01:42:56 | 2022-05-24T17:28:26 | [
"CVE-2020-2261"
] | OS command execution vulnerability in Perfecto Plugin | Perfecto Plugin allows specifying Perfecto Connect Path and Perfecto Connect File Name in job configurations.
This command is executed on the Jenkins controller in Perfecto Plugin 1.17 and earlier, allowing attackers with Job/Configure permission to run arbitrary commands on the Jenkins controller.
Perfecto Plugin 1.... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "io.jenkins.plugins:perfecto"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed"... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2261"
},
{
"type": "PACKAGE",
"url": "https://github.com/jenkinsci/perfecto-plugin"
},
{
"type": "WEB",
"url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1980"
},
{
"type": "WEB",
... | {
"cwe_ids": [
"CWE-78"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-12-29T01:42:56",
"nvd_published_at": "2020-09-16T14:15:00"
} |
1.4.0 | GHSA-4m7p-55jm-3vwv | 2023-05-25T13:20:35 | 2022-02-16T00:01:37 | [
"CVE-2022-25173"
] | Improper Neutralization of Special Elements used in an OS Command in Jenkins Pipeline: Groovy Plugin | Jenkins Pipeline: Groovy Plugin prior to 2656.vf7a_e7b_75a_457, 2.94.1, and 2.92.1 uses the same checkout directories for distinct SCMs when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted ... | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.jenkins-ci.plugins.workflow:workflow-cps"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2646.v6ed3b5b01ff1",
"fixed": null
},
{
"intr... | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25173"
},
{
"type": "WEB",
"url": "https://github.com/jenkinsci/workflow-cps-plugin/commit/f7ae7b75a457976853539bff1db52373b85fdb85"
},
{
"type": "WEB",
"url": "https://github.com/CVEProject/cvelist/blob/3615f493... | {
"cwe_ids": [
"CWE-78"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-06-20T22:48:23",
"nvd_published_at": "2022-02-15T17:15:00"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.