schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
14
228
details
stringlengths
48
1.45k
severity
stringlengths
2
78
affected
stringlengths
79
6.96k
references
stringlengths
143
6.38k
database_specific
stringlengths
131
174
1.4.0
GHSA-cpp2-q66x-fq44
2023-09-06T20:04:12Z
2018-08-06T21:39:12Z
null
['CVE-2017-16139']
Directory Traversal in jikes
Affected versions of `jikes` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jikes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.0.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16139'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jikes'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cpp2-q66x-fq44'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/476'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:12Z', 'nvd_published_at': None}
1.4.0
GHSA-4x37-5rh2-hp8c
2023-09-11T16:17:57Z
2018-08-29T23:50:59Z
null
['CVE-2017-16067']
node-opencv is malware
The `node-opencv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-opencv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16067'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4x37-5rh2-hp8c'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/506'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:36Z', 'nvd_published_at': None}
1.4.0
GHSA-2m39-62fm-q8r3
2023-01-31T01:55:03Z
2018-08-15T13:22:23Z
null
['CVE-2018-3737']
Regular Expression Denial of Service in sshpk
Versions of `sshpk` before 1.13.2 or 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys. ## Recommendation Update to version 1.13.2, 1.14.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sshpk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3737'}, {'type': 'WEB', 'url': 'https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1bccf86d3efb2fb83c14e3f9957'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319593'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2m39-62fm-q8r3'}, {'type': 'WEB', 'url': 'https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/606'}]
{'cwe_ids': ['CWE-185', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:29Z', 'nvd_published_at': '2018-06-07T02:29:00Z'}
1.4.0
GHSA-cqxw-3p7v-p9gr
2022-04-26T20:43:37Z
2018-08-21T17:08:03Z
null
['CVE-2016-10345']
Phusion Passenger uses a known /tmp filename
In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10345'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441'}, {'type': 'WEB', 'url': 'https://blog.phusion.nl/2017/01/10/passenger-5-1-1/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cqxw-3p7v-p9gr'}, {'type': 'PACKAGE', 'url': 'https://github.com/phusion/passenger/'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/blob/stable-5.1/CHANGELOG'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2016-10345.yml'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:32Z', 'nvd_published_at': None}
1.4.0
GHSA-562c-5r94-xh97
2023-08-07T16:04:04Z
2018-08-23T19:10:40Z
null
['CVE-2018-1000656']
Flask is vulnerable to Denial of Service via incorrect encoding of JSON data
The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'flask'}, 'ecosystem_specific': {'affected_functions': ['flask.json.loads', 'flask.wrappers.Request.get_json']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000656'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/pull/2691'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/commit/b178e89e4456e777b1a7ac6d7199052d0dfdbbbe'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-562c-5r94-xh97'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/flask'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/releases/tag/0.12.3'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190221-0001/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4378-1/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:05Z', 'nvd_published_at': None}
1.4.0
GHSA-f523-2f5j-gfcg
2023-09-13T19:38:19Z
2018-08-29T23:04:14Z
null
['CVE-2017-16115']
Regular Expression Denial of Service in timespan
Affected versions of `timespan` are vulnerable to a regular expression denial of service when parsing dates. The amplification for this vulnerability is significant, with 50,000 characters resulting in the event loop being blocked for around 10 seconds. ## Recommendation No direct patch is available for this vulnerability. Currently, the best available solution is to use a functionally equivalent alternative package. It is also sufficient to ensure that user input is not being passed into `timespan`, or that the maximum length of such user input is drastically reduced. Limiting the input length to 150 characters should be sufficient in most cases.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'timespan'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16115'}, {'type': 'WEB', 'url': 'https://github.com/indexzero/TimeSpan.js/issues/10'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f523-2f5j-gfcg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/533'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:38Z', 'nvd_published_at': None}
1.4.0
GHSA-gxpj-cx7g-858c
2023-09-13T23:02:31Z
2018-08-09T20:18:07Z
null
['CVE-2017-16137']
Regular Expression Denial of Service in debug
Affected versions of `debug` are vulnerable to regular expression denial of service when untrusted user input is passed into the `o` formatter. As it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue. ## Recommendation Version 2.x.x: Update to version 2.6.9 or later. Version 3.x.x: Update to version 3.1.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'debug'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.9'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'debug'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16137'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/debug/issues/501'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/debug/pull/504'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gxpj-cx7g-858c'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/534'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:18Z', 'nvd_published_at': None}
1.4.0
GHSA-72hv-rp4q-q7f3
2023-09-11T18:38:16Z
2018-08-29T23:57:14Z
null
['CVE-2017-16060']
babelcli is malware
The `babelcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'babelcli'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16060'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-72hv-rp4q-q7f3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/499'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:55Z', 'nvd_published_at': None}
1.4.0
GHSA-8wg9-92fr-6j7v
2023-09-07T18:18:38Z
2018-08-15T18:50:31Z
null
['CVE-2016-10648']
marionette-socket-host downloads Resources over HTTP
Affected versions of `marionette-socket-host` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `marionette-socket-host`. ## Recommendation No patch is currently available for this vulnerability, and the package author has removed the package from their Github account. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'marionette-socket-host'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10648'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8wg9-92fr-6j7v'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla-b2g/marionette-socket-host'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/252'}]
{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:54Z', 'nvd_published_at': None}
1.4.0
GHSA-9wv8-jgw4-4g28
2020-06-16T21:33:56Z
2018-08-15T20:04:13Z
2020-06-16T21:29:46Z
[]
High severity vulnerability that affects festivaltts4r
Withdrawn, accidental duplicate publish. The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) to_speech or (2) to_mp3 method in lib/festivaltts4r/festival4r.rb.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'festivaltts4r'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10194'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9wv8-jgw4-4g28'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:46Z', 'nvd_published_at': None}
1.4.0
GHSA-ph8p-2g97-9654
2021-01-08T18:21:22Z
2018-08-15T19:27:25Z
null
['CVE-2016-10643']
Downloads Resources over HTTP in jstestdriver
Affected versions of `jstestdriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jstestdriver`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2011. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jstestdriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10643'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ph8p-2g97-9654'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/244'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:13Z', 'nvd_published_at': None}
1.4.0
GHSA-vcfp-ppqw-mf23
2023-09-11T18:26:51Z
2018-08-17T20:20:46Z
null
['CVE-2016-10686']
fis-sass-all downloads Resources over HTTP
Affected versions of `fis-sass-all` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-sass-all`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'fis-sass-all'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10686'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vcfp-ppqw-mf23'}, {'type': 'PACKAGE', 'url': 'https://github.com/fis-dev/fis-sass'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/287'}]
{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:20Z', 'nvd_published_at': None}
1.4.0
GHSA-vv6q-9cfw-4c83
2023-09-12T18:30:03Z
2018-08-29T23:20:27Z
null
['CVE-2017-16079']
smb is malware
The `smb` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'smb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16079'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vv6q-9cfw-4c83'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/518'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:24Z', 'nvd_published_at': None}
1.4.0
GHSA-pxqr-8v54-m2hj
2023-07-04T00:05:37Z
2018-08-08T22:30:35Z
null
['CVE-2016-10522']
Cross-site request forgery in rails_admin
rails_admin ruby gem <v1.1.1 is vulnerable to cross-site request forgery (CSRF) attacks. Non-GET methods were not validating CSRF tokens and, as a result, an attacker could hypothetically gain access to the application administrative endpoints exposed by the gem.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails_admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10522'}, {'type': 'WEB', 'url': 'https://github.com/railsadminteam/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pxqr-8v54-m2hj'}, {'type': 'PACKAGE', 'url': 'https://github.com/railsadminteam/rails_admin'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2016-10522.yml'}, {'type': 'WEB', 'url': 'https://www.sourceclear.com/registry/security/cross-site-request-forgery-csrf-/ruby/sid-3173'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:17Z', 'nvd_published_at': None}
1.4.0
GHSA-x7q3-67vc-wvcf
2023-09-13T22:57:47Z
2018-08-15T19:05:14Z
null
['CVE-2016-10645']
grunt-images downloads Resources over HTTP
Affected versions of `grunt-images` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-images`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2013. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'grunt-images'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10645'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x7q3-67vc-wvcf'}, {'type': 'PACKAGE', 'url': 'https://github.com/gcpantazis/grunt-images'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/255'}]
{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:33Z', 'nvd_published_at': None}
1.4.0
GHSA-4j59-hfw6-6w7h
2021-09-16T20:54:42Z
2018-08-15T19:30:48Z
null
['CVE-2016-10642']
Downloads Resources over HTTP in cmake
Affected versions of `cmake` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cmake`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available, or installing the cmake binaries via a system package manager, such as `apt-get`. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'cmake'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10642'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4j59-hfw6-6w7h'}, {'type': 'PACKAGE', 'url': 'https://github.com/stanley-gu/cmake'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/233'}]
{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:24Z', 'nvd_published_at': None}
1.4.0
GHSA-694m-jhr9-pf77
2023-01-21T03:36:04Z
2018-08-13T20:46:41Z
null
['CVE-2018-1000211']
Doorkeeper subject to Incorrect Permission Assignment
Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000211'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/issues/891'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/pull/1119'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-694m-jhr9-pf77'}, {'type': 'PACKAGE', 'url': 'https://github.com/doorkeeper-gem/doorkeeper'}]
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:42Z', 'nvd_published_at': None}
1.4.0
GHSA-m2q3-53fq-7h66
2023-03-14T20:41:45Z
2018-08-28T22:33:51Z
null
['CVE-2015-7314']
Gollum Exposure of Sensitive Information
The Precious module in gollum before 4.0.1 allows remote attackers to read arbitrary files by leveraging the lack of a certain temporary-file check.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'gollum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7314'}, {'type': 'WEB', 'url': 'https://github.com/gollum/gollum/issues/1070'}, {'type': 'WEB', 'url': 'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1'}, {'type': 'PACKAGE', 'url': 'https://github.com/gollum/gollum'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN27548431/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000149'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/09/22/12'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:36Z', 'nvd_published_at': None}
1.4.0
GHSA-f499-jv47-9wxf
2023-09-06T20:04:27Z
2018-08-06T21:40:02Z
null
['CVE-2017-16164']
Directory Traversal in desafio
Affected versions of `desafio` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation no patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
[{'package': {'ecosystem': 'npm', 'name': 'desafio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16164'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/desafio'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f499-jv47-9wxf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/397'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:34Z', 'nvd_published_at': None}
1.4.0
GHSA-36p7-xjw8-h6f2
2023-08-28T10:31:36Z
2018-08-21T17:08:30Z
null
['CVE-2016-5697']
Ruby-saml allows attackers to perform XML signature wrapping attacks
ruby-saml prior to version 1.3.0 is vulnerable to an XML signature wrapping attack in the specific scenario where there was a signature that referenced at the same time 2 elements (but past the scheme validator process since 1 of the element was inside the encrypted assertion). ruby-saml users must update to 1.3.0, which implements 3 extra validations to mitigate this kind of attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-saml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5697'}, {'type': 'WEB', 'url': 'https://github.com/onelogin/ruby-saml/commit/a571f52171e6bfd87db59822d1d9e8c38fb3b995'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-saml/CVE-2016-5697.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/06/24/3'}]
{'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:16Z', 'nvd_published_at': None}
1.4.0
GHSA-82x2-g7vr-39wq
2020-06-17T15:14:38Z
2018-08-13T20:48:09Z
2020-06-17T15:14:38Z
[]
Moderate severity vulnerability that affects web-console
Withdrawn, accidental duplicate publish. request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'web-console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3224'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-82x2-g7vr-39wq'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:38Z', 'nvd_published_at': None}
1.4.0
GHSA-pv4c-p2j5-38j4
2023-09-11T22:06:04Z
2018-08-13T15:02:15Z
null
['CVE-2018-3774']
Open Redirect in url-parse
Versions of `url-parse` before 1.4.3 returns the wrong hostname which could lead to Open Redirect, Server Side Request Forgery (SSRF), or Bypass Authentication Protocol vulnerabilities. ## Recommendation Update to version 1.4.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3774'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/53b1794e54d0711ceb52505e0f74145270570d5a'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/d7b582ec1243e8024e60ac0b62d2569c939ef5de'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/384029'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pv4c-p2j5-38j4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/678'}]
{'cwe_ids': ['CWE-425'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:04Z', 'nvd_published_at': None}
1.4.0
GHSA-w655-w578-99pq
2020-06-17T15:15:17Z
2018-08-21T17:09:08Z
2020-06-17T15:15:17Z
[]
High severity vulnerability that affects espeak-ruby
Withdrawn, accidental duplicate publish. The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'espeak-ruby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10193'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w655-w578-99pq'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:17Z', 'nvd_published_at': None}
1.4.0
GHSA-8474-rc7c-wrhp
2020-06-17T15:14:40Z
2018-08-08T22:29:10Z
2020-06-17T15:14:40Z
[]
High severity vulnerability that affects safemode
Withdrawn, accidental duplicate publish. The safemode rubygem, as used in Foreman, versions 1.3.2 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7540'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8474-rc7c-wrhp'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:40Z', 'nvd_published_at': None}
1.4.0
GHSA-fr52-4hqw-p27f
2022-04-26T18:24:04Z
2018-08-21T19:03:26Z
null
['CVE-2016-4658']
Nokogiri does not forbid namespace nodes in XPointer ranges
xpointer.c in libxml2 before 2.9.5 (as used in nokogiri before 1.7.1 amongst other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4658'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-37'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT207141'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT207142'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT207143'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT207170'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html'}]
{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:10Z', 'nvd_published_at': None}
1.4.0
GHSA-mp78-r56v-45qc
2023-08-29T11:29:21Z
2018-08-28T22:34:31Z
null
['CVE-2015-1866']
ember-source vulnerable to Cross-site Scripting
Cross-site scripting (XSS) vulnerability in Ember.js 1.10.x before 1.10.1 and 1.11.x before 1.11.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.1'}]}], 'versions': ['1.10.0']}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1866'}, {'type': 'WEB', 'url': 'https://emberjs.com/blog/2015/04/14/security-and-bugfix-releases-ember-1-10-1-1-11-2-1-11-3.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/Acidburn0zzz/ember.js'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ember-source/CVE-2015-1866.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ember-security/nbntfs2EbRU'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228155301/http://www.securityfocus.com/bid/74185'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/04/14/11'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:40Z', 'nvd_published_at': None}
1.4.0
GHSA-2j55-pcw5-x4h2
2023-01-18T21:33:05Z
2018-08-13T15:02:49Z
null
['CVE-2018-3779']
active-support impersonates 'activesupport' gem
The `active-support` ruby gem gem is malware and duplicates the official `activesupport` (no hyphen) gem, but adds a compiled extension. The extension attempts to resolve a base64 encoded domain (29faea63.planfhntage.de), downloads a payload, and executes. This trojan horse gem could allow a remote attacker to execute arbitrary code on the system, caused by containing a malicious backdoor. An attacker could exploit this vulnerability to execute arbitrary code on the system. No version of this gem should be considered safe.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'active-support'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3779'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/392311'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2j55-pcw5-x4h2'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:19Z', 'nvd_published_at': None}
1.4.0
GHSA-7322-9mx6-5j2m
2023-01-23T20:45:35Z
2018-08-15T20:04:30Z
null
['CVE-2015-5147']
redcarpet Buffer Overflow vulnerability
Stack-based buffer overflow in the `header_anchor` function in the HTML renderer in Redcarpet before 3.3.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'redcarpet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5147'}, {'type': 'WEB', 'url': 'https://github.com/vmg/redcarpet/commit/2cee777c1e5babe8a1e2683d31ea75cc4afe55fb'}, {'type': 'PACKAGE', 'url': 'https://github.com/vmg/redcarpet'}, {'type': 'WEB', 'url': 'https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150711061256/http://www.securityfocus.com/bid/75508'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/29/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/30/10'}]
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:00Z', 'nvd_published_at': None}
1.4.0
GHSA-995j-587r-259w
2020-06-16T21:42:03Z
2018-08-13T20:46:58Z
2020-06-16T21:28:00Z
[]
Moderate severity vulnerability that affects rack-mini-profiler
Withdrawn, accidental duplicate publish. The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack-mini-profiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4442'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-995j-587r-259w'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:00Z', 'nvd_published_at': None}
1.4.0
GHSA-9wcm-rrvh-qjc8
2020-06-17T15:14:43Z
2018-08-15T20:03:53Z
2020-06-17T15:14:43Z
[]
High severity vulnerability that affects colorscore
Withdrawn, accidental duplicate publish. The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'colorscore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9wcm-rrvh-qjc8'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:43Z', 'nvd_published_at': None}
1.4.0
GHSA-hm48-76wh-q86v
2020-06-17T15:14:48Z
2018-08-21T19:03:17Z
2020-06-17T15:14:48Z
[]
High severity vulnerability that affects activerecord
Withdrawn, accidental duplicate publish. activerecord/lib/active_record/relation/query_methods.rb in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes create_with calls.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3514'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hm48-76wh-q86v'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:48Z', 'nvd_published_at': None}
1.4.0
GHSA-4q53-fqhc-cr46
2023-08-29T10:51:34Z
2018-08-28T22:33:42Z
null
['CVE-2014-0046']
ember-source Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in the link-to helper in Ember.js 1.2.x before 1.2.2, 1.3.x before 1.3.2, and 1.4.x before 1.4.0-beta.6, when used in non-block form, allows remote attackers to inject arbitrary web script or HTML via the title attribute.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0-beta.1'}, {'fixed': '1.4.0-beta.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0046'}, {'type': 'WEB', 'url': 'https://github.com/emberjs/ember.js/commit/45ee8df2a0efc0afe233d6b9b17045782a2e6b2d'}, {'type': 'WEB', 'url': 'https://github.com/emberjs/ember.js/commit/94b28b8773acf894c4d7d7fccf4411a706292436'}, {'type': 'WEB', 'url': 'https://github.com/emberjs/ember.js/commit/ab3199e68e1d0fc3c8f7f453cd38c51fe02af90b'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/91242'}, {'type': 'PACKAGE', 'url': 'https://github.com/emberjs/ember.js'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ember-source/CVE-2014-0046.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ'}, {'type': 'WEB', 'url': 'http://emberjs.com/blog/2014/02/07/ember-security-releases.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/56965'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/02/14/6'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/65579'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:44Z', 'nvd_published_at': '2014-02-27T15:55:00Z'}
1.4.0
GHSA-8225-6cvr-8pqp
2023-09-08T23:55:11Z
2018-08-09T20:13:01Z
null
['CVE-2017-16129']
superagent vulnerable to zip bomb attacks
Affected versions of `superagent` do not check the post-decompression size of ZIP compressed HTTP responses prior to decompressing. This results in the package being vulnerable to a [ZIP bomb](https://en.wikipedia.org/wiki/Zip_bomb) attack, where an extremely small ZIP file becomes many orders of magnitude larger when decompressed. This may result in unrestrained CPU/Memory/Disk consumption, causing a denial of service condition. ## Recommendation Update to version 3.7.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'superagent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16129'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/superagent/issues/1259'}, {'type': 'WEB', 'url': 'https://en.wikipedia.org/wiki/Zip_bomb'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8225-6cvr-8pqp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/479'}]
{'cwe_ids': ['CWE-400', 'CWE-409'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:56Z', 'nvd_published_at': None}
1.4.0
GHSA-wqg7-vrj7-v82h
2023-09-07T22:27:31Z
2018-08-31T06:22:50Z
null
['CVE-2018-11615']
Mosca REDoS Vulnerability
This vulnerability allows remote attackers to deny service on vulnerable installations of npm mosca 2.8.1. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of topics. A crafted regular expression can cause the broker to crash. An attacker can leverage this vulnerability to deny access to the target system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mosca'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11615'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wqg7-vrj7-v82h'}, {'type': 'WEB', 'url': 'https://zerodayinitiative.com/advisories/ZDI-18-583'}]
{'cwe_ids': ['CWE-185', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:00Z', 'nvd_published_at': None}
1.4.0
GHSA-534w-937m-v7x3
2023-06-09T20:17:46Z
2018-08-03T21:04:02Z
null
['CVE-2018-3777']
restforce vulnerable to Improper Input Validation
A flaw in how restforce constructs URLs may allow an attacker to inject additional parameters into Salesforce API requests. Impact ------ This flaw is only exploitable in applications that pass user input directly to restforce's select, find, describe, update, upsert, and destroy methods. Vulnerable code might look like: ```ruby client.select('SomeSalesForceObject', params[:some-id], ...) ``` In such an application, attackers could pass `0016000000MRatd/describe` as a request parameter, causing the server to make a request to a different endpoint than the server is designed to handle. Since the Salesforce REST API supports overriding HTTP methods via a request parameter, an attacker could also cause the client's `select()` method to modify data, by passing `0016000000MRatd/?_HttpMethod=PATCH&other-query-params=...`. Workarounds ------ If possible, applications should track salesforce IDs internally, rather than passing user-supplied IDs to salesforce. Such practice mitigates this vulnerability, and in general is desirable for ensuring strong access control.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'restforce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3777'}, {'type': 'WEB', 'url': 'https://github.com/restforce/restforce/pull/392'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-534w-937m-v7x3'}, {'type': 'PACKAGE', 'url': 'https://github.com/restforce/restforce'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/restforce/CVE-2018-3777.yml'}]
{'cwe_ids': ['CWE-172', 'CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:51Z', 'nvd_published_at': '2018-08-03T20:29:00Z'}
1.4.0
GHSA-xrr4-74mc-rpjc
2022-04-26T18:22:26Z
2018-08-21T17:01:29Z
null
['CVE-2011-2765']
Pyro mishandles pid files in temporary directory locations and opening the pid file as root
pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2765'}, {'type': 'WEB', 'url': 'https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/631912'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xrr4-74mc-rpjc'}, {'type': 'PACKAGE', 'url': 'https://github.com/irmen/Pyro3'}, {'type': 'WEB', 'url': 'https://pythonhosted.org/Pyro/12-changes.html'}]
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:21Z', 'nvd_published_at': None}
1.4.0
GHSA-xjqg-9jvg-fgx2
2023-03-13T23:53:36Z
2018-08-21T19:03:04Z
null
['CVE-2015-5312']
Nokogiri subject to DoS via libxml2 vulnerability
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 (as used in nokogiri before 1.6.7.1) does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.7.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5312'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1276693'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-5312.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/aSbgDiwb24s'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-37'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206166'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206167'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206168'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206169'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=145382616617563&w=2'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2549.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2550.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3430'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2834-1'}, {'type': 'WEB', 'url': 'http://xmlsoft.org/news.html'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:39Z', 'nvd_published_at': None}
1.4.0
GHSA-6fjr-m7v6-fpg9
2023-09-06T18:29:27Z
2018-08-06T21:41:38Z
null
['CVE-2017-16204']
jquey is malware
The `jquey` package is malware that attempts to discover and exfiltrate sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `jquey` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jquey'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16204'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6fjr-m7v6-fpg9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/544'}]
{'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:06Z', 'nvd_published_at': None}
1.4.0
GHSA-m6wh-m8m8-6xx5
2023-09-06T20:07:33Z
2018-08-06T20:05:28Z
null
['CVE-2017-16202']
cofeescript is malware
The `cofeescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `cofeescript` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
[]
[{'package': {'ecosystem': 'npm', 'name': 'cofeescript'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16202'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m6wh-m8m8-6xx5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/541'}]
{'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:11Z', 'nvd_published_at': None}
1.4.0
GHSA-hg4c-rgvm-964g
2021-12-02T23:19:05Z
2018-08-15T20:02:53Z
null
['CVE-2016-8640']
SQL Injection in pycsw
A SQL injection vulnerability in pycsw all versions before 2.0.2, 1.10.5 and 1.8.6 that leads to read and extract of any data from any table in the pycsw database that the database user has access to. Also on PostgreSQL (at least) it is possible to perform updates/inserts/deletes and database modifications to any table the database user has access to.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pycsw'}, 'ecosystem_specific': {'affected_functions': ['pycsw.ogc.csw.csw2.Csw2.getrecords']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pycsw'}, 'ecosystem_specific': {'affected_functions': ['pycsw.ogc.csw.csw2.Csw2.getrecords']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pycsw'}, 'ecosystem_specific': {'affected_functions': ['pycsw.ogc.csw.csw2.Csw2.getrecords']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8640'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pycsw/pull/474/files'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pycsw/commit/522873e5ce48bb9cbd4e7e8168ca881ce709c222'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pycsw/commit/69546e13527c82e4f9191769215490381ad511b2'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pycsw/commit/daaf09b4b920708a415be3c7f446739661ba3753'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hg4c-rgvm-964g'}, {'type': 'PACKAGE', 'url': 'https://github.com/geopython/pycsw'}, {'type': 'WEB', 'url': 'https://patch-diff.githubusercontent.com/raw/geopython/pycsw/pull/474.patch'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2016/q4/406'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/94302'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:01Z', 'nvd_published_at': None}
1.4.0
GHSA-44vc-fpcg-5cc5
2020-06-16T21:30:40Z
2018-08-08T22:29:49Z
2020-06-16T20:57:19Z
[]
Moderate severity vulnerability that affects safemode
Withdrawn, accidental duplicate publish. The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3693'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-44vc-fpcg-5cc5'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:19Z', 'nvd_published_at': None}
1.4.0
GHSA-xh56-3f5w-9h25
2023-09-07T18:51:58Z
2018-08-29T23:40:01Z
null
['CVE-2017-16071']
nodemailer-js is malware
The `nodemailer-js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodemailer-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16071'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xh56-3f5w-9h25'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/510'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:27Z', 'nvd_published_at': None}
1.4.0
GHSA-2hxv-mx8x-mcj9
2023-08-28T10:47:48Z
2018-08-28T22:34:22Z
null
['CVE-2015-4619']
Spina gem vulnerable to Cross-site request forgery (CSRF) vulnerability
Cross-site request forgery (CSRF) vulnerability in Spina before commit bfe44f289e336f80b6593032679300c493735e75. `Spina::ApplicationController` actions didn't have CSRF protection. This causes a CSRF vulnerability across the entire engine which includes administrative functionality such as creating users, changing passwords, and media management.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'spina'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.29'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4619'}, {'type': 'WEB', 'url': 'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75'}, {'type': 'PACKAGE', 'url': 'https://github.com/denkGroot/Spina'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spina/CVE-2015-4619.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/16/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/16/20'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/75216'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:12Z', 'nvd_published_at': None}
1.4.0
GHSA-q7wx-62r7-j2x7
2023-03-14T19:07:20Z
2018-08-08T22:31:12Z
null
['CVE-2015-1819']
Nokogiri vulnerable to libxml XML Entity Expansion
The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.6.0'}, {'fixed': '1.6.6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.6.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1819'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1374'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=213f1fe0d76d30eaed6e5853057defc43e6df2c9'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-1819.yml'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201507-08'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-37'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206166'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206167'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206168'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206169'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172710.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172943.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1419.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2550.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3430'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2812-1'}, {'type': 'WEB', 'url': 'http://xmlsoft.org/news.html'}]
{'cwe_ids': ['CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:25Z', 'nvd_published_at': None}
1.4.0
GHSA-rp28-29ch-gh92
2023-09-08T23:13:40Z
2018-08-06T21:30:15Z
null
['CVE-2017-16222']
Directory Traversal in elding
Affected versions of `elding` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. This vulnerability only affects files that have file extensions - i.e. `/etc/passwd` will be treated as a directory, and a read attempt on `/etc/passwd/index.js` will be made and subsequently fail. **Example request:** ```http GET /../../../../../../../../../../some_app_dir/secrets.json HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'elding'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16222'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/elding'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rp28-29ch-gh92'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/415'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:14Z', 'nvd_published_at': None}
1.4.0
GHSA-j866-8vxx-27hx
2023-09-08T23:02:21Z
2018-08-29T23:43:53Z
null
['CVE-2017-16072']
nodemailer.js is malware
The `nodemailer.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodemailer.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16072'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j866-8vxx-27hx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/511'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:35Z', 'nvd_published_at': None}
1.4.0
GHSA-4g54-95xv-f353
2023-09-11T18:34:27Z
2018-08-29T23:16:56Z
null
['CVE-2017-16075']
http-proxy.js is malware
The `http-proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'http-proxy.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16075'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4g54-95xv-f353'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/514'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:19Z', 'nvd_published_at': None}
1.4.0
GHSA-2gw2-8q9w-cw8p
2023-01-25T22:55:50Z
2018-08-31T14:55:43Z
null
['CVE-2018-1000201']
Ruby-ffi has a DLL loading issue
ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ffi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.24'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000201'}, {'type': 'WEB', 'url': 'https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a'}, {'type': 'WEB', 'url': 'https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c'}, {'type': 'PACKAGE', 'url': 'https://github.com/ffi/ffi'}, {'type': 'WEB', 'url': 'https://github.com/ffi/ffi/releases/tag/1.9.24'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ffi/CVE-2018-1000201.yml'}]
{'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:04Z', 'nvd_published_at': None}
1.4.0
GHSA-4cmx-hrq9-c23p
2023-04-21T18:30:53Z
2018-08-15T20:03:22Z
null
['CVE-2018-3778']
Improper Authorization in aedes
Versions of `aedes` before 0.35.1 does not respect its own authorization rules when a client sets a `Last Will`. ## Recommendation Update to version 0.35.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'aedes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.35.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3778'}, {'type': 'WEB', 'url': 'https://github.com/moscajs/aedes/issues/211'}, {'type': 'WEB', 'url': 'https://github.com/moscajs/aedes/issues/212'}, {'type': 'WEB', 'url': 'https://github.com/moscajs/aedes/commit/ffbc1702bb24b596afbb96407cc6db234a4044a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/moscajs/aedes'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/457.json'}]
{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:11Z', 'nvd_published_at': '2018-08-08T20:29:00Z'}
1.4.0
GHSA-phmw-pv3f-vvx7
2021-12-02T23:09:12Z
2018-08-13T20:47:44Z
2020-06-17T15:14:58Z
[]
Moderate severity vulnerability that affects paperclip
Withdrawn, accidental duplicate publish. The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'paperclip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2963'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-phmw-pv3f-vvx7'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/paperclip'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:58Z', 'nvd_published_at': None}
1.4.0
GHSA-72fg-jqhx-c68p
2023-09-11T18:37:42Z
2018-08-06T21:33:31Z
null
['CVE-2017-16224']
Open Redirect in st
st is a module for serving static files. An attacker is able to craft a request that results in an `HTTP 301` (redirect) to an entirely different domain. A request for: `http://some.server.com//nodesecurity.org/%2e%2e` would result in a 301 to `//nodesecurity.org/%2e%2e` which most browsers treat as a proper redirect as `//` is translated into the current schema being used. **Mitigating factor:** In order for this to work, `st` must be serving from the root of a server (`/`) rather than the typical sub directory (`/static/`) and the redirect URL will end with some form of URL encoded `..` ("%2e%2e", "%2e.", ".%2e"). Code example (provided by Xin Gao): [example.js] ```js var st = require('st') var http = require('http') http.createServer(st(process.cwd())).listen(1337) ``` ```shell $ curl -v http://localhost:1337//cve.mitre.com/%2e%2e * Trying ::1... * TCP_NODELAY set * Connected to localhost (::1) port 1337 (#0) > GET //cve.mitre.com/%2e%2e HTTP/1.1 > Host: localhost:1337 > User-Agent: curl/7.54.0 > Accept: */* > < HTTP/1.1 301 Moved Permanently < cache-control: public, max-age=600 < last-modified: Fri, 13 Oct 2017 22:56:33 GMT < etag: "16777220-46488904-1507935393000" < location: //cve.mitre.com/%2e%2e/ < Date: Fri, 13 Oct 2017 22:56:41 GMT < Connection: keep-alive < Content-Length: 30 < * Connection #0 to host localhost left intact ``` ## Recommendation Update to version 1.2.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'st'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16224'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-72fg-jqhx-c68p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/547'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:52Z', 'nvd_published_at': None}
1.4.0
GHSA-8gg6-3r63-25m8
2023-08-29T12:09:29Z
2018-08-15T20:03:37Z
null
['CVE-2015-8968']
git-fastclone permits arbitrary shell command execution from .gitmodules
git-fastclone before 1.0.1 permits arbitrary shell command execution from .gitmodules. If an attacker can instruct a user to run a recursive clone from a repository they control, they can get a client to run an arbitrary shell command. Alternately, if an attacker can MITM an unencrypted git clone, they could exploit this. The ext command will be run if the repository is recursively cloned or if submodules are updated. This attack works when cloning both local and remote repositories.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'git-fastclone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8968'}, {'type': 'WEB', 'url': 'https://github.com/square/git-fastclone/pull/2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/104465'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/git-fastclone/CVE-2015-8968.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/git-fastclone'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227213019/http://www.securityfocus.com/bid/81433'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:37Z', 'nvd_published_at': None}
1.4.0
GHSA-8h55-49jm-739x
2023-09-11T16:34:56Z
2018-08-29T23:21:46Z
null
['CVE-2017-16109']
Directory Traversal in easyquick
Affected versions of `easyquick` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'easyquick'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16109'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/easyquick'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8h55-49jm-739x'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/373'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:39Z', 'nvd_published_at': None}
1.4.0
GHSA-38f5-ghc2-fcmv
2023-09-12T18:38:55Z
2018-08-21T17:02:43Z
null
['CVE-2018-3784']
Code Injection in cryo
All versions of `cryo` are vulnerable to code injection due to an Insecure implementation of deserialization. ## Proof of concept ```js var Cryo = require('cryo'); var frozen = '{"root":"_CRYO_REF_3","references":[{"contents":{},"value":"_CRYO_FUNCTION_function () {console.log(\\"defconrussia\\"); return 1111;}"},{"contents":{},"value":"_CRYO_FUNCTION_function () {console.log(\\"defconrussia\\");return 2222;}"},{"contents":{"toString":"_CRYO_REF_0","valueOf":"_CRYO_REF_1"},"value":"_CRYO_OBJECT_"},{"contents":{"__proto__":"_CRYO_REF_2"},"value":"_CRYO_OBJECT_"}]}' var hydrated = Cryo.parse(frozen); console.log(hydrated); ``` ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'cryo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3784'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/350418'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38f5-ghc2-fcmv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/690'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:31Z', 'nvd_published_at': None}
1.4.0
GHSA-5mjw-6jrh-hvfq
2023-09-11T16:18:58Z
2018-08-06T21:37:06Z
null
['CVE-2017-16226']
Sandbox Breakout / Arbitrary Code Execution in static-eval
Affected versions of `static-eval` pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package. ## Proof of concept ```js var evaluate = require('static-eval'); var parse = require('esprima').parse; var src = '(function(){console.log(process.pid)})()'; var ast = parse(src).body[0].expression; var res = evaluate(ast, {}); // Will print the process id ``` ## Recommendation Update to version 2.0.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'static-eval'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16226'}, {'type': 'WEB', 'url': 'https://github.com/substack/static-eval/pull/18'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5mjw-6jrh-hvfq'}, {'type': 'WEB', 'url': 'https://maustin.net/articles/2017-10/static_eval'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/548'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:46Z', 'nvd_published_at': None}
1.4.0
GHSA-p65h-233c-jxvm
2021-01-08T18:23:55Z
2018-08-15T19:03:59Z
null
['CVE-2016-10646']
Downloads Resources over HTTP in resourcehacker
Affected versions of `resourcehacker` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `resourcehacker`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'resourcehacker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10646'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p65h-233c-jxvm'}, {'type': 'WEB', 'url': 'https://github.com/felicienfrancois/node-resourcehacker/blob/master/scripts/install.js#L4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/254'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:07Z', 'nvd_published_at': None}
1.4.0
GHSA-mf6w-45cf-qhmp
2023-01-26T21:13:16Z
2018-08-15T20:04:44Z
null
['CVE-2015-8969']
Git-fastclone passes user modifiable strings directly to a shell command
git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to `cd ` and `git clone ` commands in the library.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'git-fastclone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8969'}, {'type': 'WEB', 'url': 'https://github.com/square/git-fastclone/pull/5'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/105190'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/git-fastclone/CVE-2015-8969.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/git-fastclone'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20161108132238/http://www.securityfocus.com/bid/81433'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:57Z', 'nvd_published_at': None}
1.4.0
GHSA-5hxw-r847-qfwp
2023-09-07T18:31:39Z
2018-08-29T23:47:07Z
null
['CVE-2017-16066']
opencv.js is malware
opencv.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'opencv.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16066'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5hxw-r847-qfwp'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:22Z', 'nvd_published_at': None}
1.4.0
GHSA-hv9c-qwqg-qj3v
2022-08-02T18:03:09Z
2018-08-23T19:12:08Z
null
['CVE-2018-15685']
Electron webPreferences vulnerability can be used to perform remote code execution
GitHub Electron 1.7.15, 1.8.7, 2.0.7, and 3.0.0-beta.6, in certain scenarios involving IFRAME elements and "nativeWindowOpen: true" or "sandbox: true" options, is affected by a webPreferences vulnerability that can be leveraged to perform remote code execution. More information to determine if you are impacted can be found on the [electron blog](https://electronjs.org/blog/web-preferences-fix). ## Recommendation Upgrade Electron to >=3.0.0-beta.7, >=2.0.8, >=1.8.8, or >=1.7.16.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.16'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-beta.1'}, {'fixed': '3.0.0-beta.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15685'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/519a02d8d4d28e8a467acb40fb26172a80c9454f'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/80221e52d93a96ea704cb6748ead669c55cff504'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/bab968ca776be28791e4dddfd50c86bd5fae62fa'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/ef0a6d9a1c96efc4657c6dd3a6624eba969f095b'}, {'type': 'WEB', 'url': 'https://electronjs.org/blog/web-preferences-fix'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}, {'type': 'WEB', 'url': 'https://www.contrastsecurity.com/security-influencers/cve-2018-15685'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45272/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/732'}]
{'cwe_ids': ['CWE-1188'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:01Z', 'nvd_published_at': None}
1.4.0
GHSA-h3c2-x77c-7pvr
2023-02-03T20:44:46Z
2018-08-21T17:03:33Z
null
['CVE-2018-3785']
Command Injection in git-dummy-commit
A command injection in git-dummy-commit v1.3.0 allows os level commands to be executed due to an unescaped parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'git-dummy-commit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3785'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/341710'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h3c2-x77c-7pvr'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:34Z', 'nvd_published_at': '2018-08-17T13:29:00Z'}
1.4.0
GHSA-36vc-cw62-fqvr
2023-09-05T22:35:19Z
2018-08-27T19:07:23Z
null
['CVE-2017-16078']
Shadowsock is malware
The `shadowsock` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[]
[{'package': {'ecosystem': 'npm', 'name': 'shadowsock'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16078'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-36vc-cw62-fqvr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/517'}]
{'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:19Z', 'nvd_published_at': None}
1.4.0
GHSA-qj73-v688-wqxf
2020-08-31T18:26:04Z
2018-08-29T23:19:13Z
null
['CVE-2017-16076']
Hijacked Environment Variables in proxy.js
The `proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[]
[{'package': {'ecosystem': 'npm', 'name': 'proxy.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16076'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qj73-v688-wqxf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/515'}]
{'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:09Z', 'nvd_published_at': None}
1.4.0
GHSA-8f64-q7jc-ccgp
2023-01-31T01:53:19Z
2018-08-08T22:25:57Z
null
['CVE-2018-3773']
metascraper before v5.2.0 vulnerable to stored cross-site scripting
Versions of `metascraper` prior to 5.2.0 are vulnerable to stored cross-site scripting (XSS). ## Recommendation Upgrade to version 5.2.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'metascraper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3773'}, {'type': 'WEB', 'url': 'https://github.com/microlinkhq/metascraper/pull/169'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/309367'}, {'type': 'PACKAGE', 'url': 'https://github.com/microlinkhq/metascraper'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/603'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:23Z', 'nvd_published_at': '2018-07-30T18:29:00Z'}
1.4.0
GHSA-mc9x-v9xg-25pm
2023-09-12T18:43:18Z
2018-08-06T20:12:54Z
null
['CVE-2017-16205']
coffescript is malware
The `coffescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `coffescript` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'coffescript'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16205'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mc9x-v9xg-25pm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/542'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:52Z', 'nvd_published_at': None}
1.4.0
GHSA-hgg3-g7gr-66r7
2023-08-08T10:35:15Z
2018-08-27T19:52:28Z
null
['CVE-2018-15560']
PyCryptodome Integer overflow vulnerability
PyCryptodome before 3.6.6 has an integer overflow in the data_len variable in AESNI.c, related to the AESNI_encrypt and AESNI_decrypt functions, leading to the mishandling of messages shorter than 16 bytes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pycryptodome'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15560'}, {'type': 'WEB', 'url': 'https://github.com/Legrandin/pycryptodome/issues/198'}, {'type': 'PACKAGE', 'url': 'https://github.com/Legrandin/pycryptodome'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hgg3-g7gr-66r7'}, {'type': 'WEB', 'url': 'https://whitehatck01.blogspot.com/2018/08/integer-overflow-vulnerability-in.html'}]
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:07Z', 'nvd_published_at': None}
1.4.0
GHSA-m8h6-m9p5-p2f8
2021-12-02T23:15:03Z
2018-08-13T20:49:01Z
2020-06-16T21:45:29Z
[]
Moderate severity vulnerability that affects activerecord
Withdrawn, accidental duplicate publish. Active Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.7.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6317'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m8h6-m9p5-p2f8'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:29Z', 'nvd_published_at': None}
1.4.0
GHSA-c2m4-w5hm-vqjw
2023-09-13T22:48:21Z
2018-08-29T23:05:46Z
null
['CVE-2017-16074']
crossenv is malware
The `crossenv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'crossenv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16074'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c2m4-w5hm-vqjw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/513'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:01Z', 'nvd_published_at': None}
1.4.0
GHSA-jhq3-57xh-6643
2021-09-14T19:42:55Z
2018-08-21T17:03:59Z
null
['CVE-2018-3783']
Privilege Escalation due to Blind NoSQL Injection in flintcms
Versions of `flintcms` before version 1.1.10 are vulnerable to account takeover due to blind MongoDB injection in the password reset. ## Recommendation Update to version 1.1.10 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'flintcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3783'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/386807'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhq3-57xh-6643'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/689'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:33Z', 'nvd_published_at': None}
1.4.0
GHSA-gvpx-9459-w3mj
2021-09-13T13:35:54Z
2018-05-23T20:37:46Z
null
['CVE-2018-11093']
Cross-Site Scripting in @ckeditor/ckeditor5-link
Versions of `status-board` prior to 10.0.1 are vulnerable to Cross-Site Scripting. The `_createPreviewButton()` function fails to sanitize the `href` attribute of a created `<a>` tag. This may allow attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 10.0.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-link'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '10.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11093'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5-link/commit/8cb782eceba10fc481e4021cb5d25b2a85d1b04e'}, {'type': 'WEB', 'url': 'https://ckeditor.com/blog/CKEditor-5-v10.0.1-released/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gvpx-9459-w3mj'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor5-link'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5-link/blob/master/CHANGELOG.md#1001-2018-05-22'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5LINK-72892'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1154'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:08Z', 'nvd_published_at': None}
1.4.0
GHSA-43fp-vwwg-qgv6
2023-09-11T20:45:18Z
2018-12-20T22:02:32Z
null
['CVE-2018-17194']
Apache NiFi Improper Input Validation vulnerability
When a client request to a cluster node was replicated to other nodes in the cluster for verification, the Content-Length was forwarded. On a DELETE request, the body was ignored, but if the initial request had a Content-Length value other than 0, the receiving nodes would wait for the body and eventually timeout. Mitigation: The fix to check DELETE requests and overwrite non-zero Content-Length header values was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-framework-cluster'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17194'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/1baead6f525046a613fc4fe494a0d193776ea70f,'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018-17194'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:07Z', 'nvd_published_at': None}
1.4.0
GHSA-4qq9-rrq6-48ff
2021-09-01T18:01:38Z
2018-12-20T22:02:39Z
null
['CVE-2018-17193']
Moderate severity vulnerability that affects org.apache.nifi:nifi
The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17193'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4qq9-rrq6-48ff'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018-17193'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:51Z', 'nvd_published_at': None}
1.4.0
GHSA-5p52-j8pw-j7x5
2022-09-14T22:12:54Z
2018-12-19T19:24:52Z
null
['CVE-2018-20000']
Improper Restriction of XML External Entity Reference in bedework:bw-webdav
Apereo Bedework bw-webdav before 4.0.3 allows XXE attacks, as demonstrated by an invite-reply document that reads a local file, related to webdav/servlet/common/MethodBase.java and webdav/servlet/common/PostRequestPars.java.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bedework:bw-webdav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20000'}, {'type': 'WEB', 'url': 'https://github.com/Bedework/bw-webdav/pull/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bedework/bw-webdav'}, {'type': 'WEB', 'url': 'https://github.com/Bedework/bw-webdav/compare/bw-webdav-4.0.2...bw-webdav-4.0.3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5p52-j8pw-j7x5'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:51Z', 'nvd_published_at': None}
1.4.0
GHSA-jxm5-5xcw-h57q
2022-11-15T16:07:28Z
2018-12-20T22:02:17Z
null
['CVE-2018-1000823']
exist-db:exist-core XML External Entity (XXE) vulnerability
exist version <= 5.0.0-RC4 contains a XML External Entity (XXE) vulnerability in XML Parser for REST Server that can result in Disclosure of confidential data, denial of service, SSRF, port scanning.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.exist-db:exist-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000823'}, {'type': 'WEB', 'url': 'https://github.com/eXist-db/exist/issues/2180'}, {'type': 'WEB', 'url': 'https://github.com/eXist-db/exist/pull/2243'}, {'type': 'WEB', 'url': 'https://github.com/eXist-db/exist/pull/2247'}, {'type': 'WEB', 'url': 'https://github.com/eXist-db/exist/commit/1c3f0aec14d00bdbca175713af70cb7c7b868e9f'}, {'type': 'WEB', 'url': 'https://github.com/eXist-db/exist/commit/b210f9fbf379b68842f2b055dda80d7e7479e96f'}, {'type': 'WEB', 'url': 'https://0dd.zone/2018/10/27/exist-XXE/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jxm5-5xcw-h57q'}, {'type': 'PACKAGE', 'url': 'https://github.com/eXist-db/exist'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:26Z', 'nvd_published_at': None}
1.4.0
GHSA-cq27-v7xp-c356
2022-09-14T22:11:10Z
2018-12-14T18:51:38Z
null
['CVE-2013-7459']
Buffer Overflow in pycrypto
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pycrypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7459'}, {'type': 'WEB', 'url': 'https://github.com/dlitz/pycrypto/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1409754'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cq27-v7xp-c356'}, {'type': 'PACKAGE', 'url': 'https://github.com/dlitz/pycrypto'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C6BWNADPLKDBBQBUT3P75W7HAJCE7M3B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJ37R2YLX56YZABFNAOWV4VTHTGYREAE/'}, {'type': 'WEB', 'url': 'https://pony7.fr/ctf:public:32c3:cryptmsg'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201702-14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/12/27/8'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95122'}]
{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:15Z', 'nvd_published_at': None}
1.4.0
GHSA-mr4x-c4v9-x729
2023-08-30T23:20:56Z
2018-12-20T22:01:46Z
null
['CVE-2018-1000814']
aiohttp-session creates non-expiring sessions
aio-libs aiohttp-session version 2.6.0 and earlier contains a Other/Unknown vulnerability in EncryptedCookieStorage and NaClCookieStorage that can result in Non-expiring sessions / Infinite lifespan. This attack appear to be exploitable via Recreation of a cookie post-expiry with the same value.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'aiohttp-session'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000814'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/issues/325'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/pull/331'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/pull/331/commits/308c839deac8ed9be169397c1328f72c75ac793e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mr4x-c4v9-x729'}, {'type': 'PACKAGE', 'url': 'https://github.com/aio-libs/aiohttp-session'}]
{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:02Z', 'nvd_published_at': None}
1.4.0
GHSA-xmvg-w4f9-99r7
2022-09-14T22:23:07Z
2018-12-20T22:02:51Z
null
['CVE-2018-1000836']
XML External Entity (XXE) vulnerability in bw-calendar-engine
bw-calendar-engine version <= bw-calendar-engine-3.12.0 contains a XML External Entity (XXE) vulnerability in IscheduleClient XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via Man in the Middle or malicious server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bedework.caleng:bw-calendar-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.12.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000836'}, {'type': 'WEB', 'url': 'https://github.com/Bedework/bw-calendar-engine/issues/3'}, {'type': 'WEB', 'url': 'https://0dd.zone/2018/10/28/bw-calendar-engine-XXE-MitM/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bedework/bw-calendar-engine'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xmvg-w4f9-99r7'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:50Z', 'nvd_published_at': None}
1.4.0
GHSA-9448-c9wq-jg9v
2022-09-14T22:28:00Z
2018-12-21T17:49:33Z
null
['CVE-2018-11786']
Improper Privilege Management in Apache Karaf
In Apache Karaf prior to 4.2.0 release, if the sshd service in Karaf is left on so an administrator can manage the running instance, any user with rights to the Karaf console can pivot and read/write any file on the file system to which the Karaf process user has access. This can be locked down a bit by using chroot to change the root directory to protect files outside of the Karaf install directory; it can be further locked down by defining a security manager policy that limits file system access to those directories beneath the Karaf home that are necessary for the system to run. However, this still allows anyone with ssh access to the Karaf process to read and write a large number of files as the Karaf process user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11786'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9448-c9wq-jg9v'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/KARAF-5427'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5b7ac762c6bbe77ac5d9389f093fc6dbf196c36d788e3d7629e6c1d9@%3Cdev.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://karaf.apache.org/security/cve-2018-11786.txt'}]
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:21Z', 'nvd_published_at': None}
1.4.0
GHSA-wg5w-vv93-3f7w
2021-09-21T19:44:14Z
2018-12-20T22:01:18Z
null
['CVE-2018-11799']
Moderate severity vulnerability that affects org.apache.oozie:oozie-core
Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user's name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.oozie:oozie-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11799'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wg5w-vv93-3f7w'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/347e7a8cb86014b7ca37e49eb00b8d088203bdc0bcfb4799f8e5955a@%3Cuser.oozie.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106266'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:20Z', 'nvd_published_at': None}
1.4.0
GHSA-gf2j-7qwg-4f5x
2022-09-14T22:26:11Z
2018-12-21T17:48:45Z
null
['CVE-2018-14637']
Improper Authentication in Keycloak
The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14637'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gf2j-7qwg-4f5x'}]
{'cwe_ids': ['CWE-285', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:56Z', 'nvd_published_at': None}
1.4.0
GHSA-gfv6-cj92-g3hx
2023-08-08T12:26:56Z
2018-12-21T17:46:39Z
null
['CVE-2018-1000872']
PyKMIP Denial of service vulnerability
OpenKMIP PyKMIP version All versions before 0.8.0 contains a CWE 399: Resource Management Errors (similar issue to CVE-2015-5262) vulnerability in PyKMIP server that can result in DOS: the server can be made unavailable by one or more clients opening all of the available sockets. This attack appear to be exploitable via A client or clients open sockets with the server and then never close them. This vulnerability appears to have been fixed in 0.8.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pykmip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000872'}, {'type': 'WEB', 'url': 'https://github.com/OpenKMIP/PyKMIP/issues/430'}, {'type': 'WEB', 'url': 'https://github.com/OpenKMIP/PyKMIP/commit/3a7b880bdf70d295ed8af3a5880bab65fa6b3932'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenKMIP/PyKMIP'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gfv6-cj92-g3hx'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:11Z', 'nvd_published_at': None}
1.4.0
GHSA-8r8j-xvfj-36f9
2023-08-07T16:14:35Z
2018-12-19T19:25:14Z
null
['CVE-2018-20133']
Code injection in ymlref
ymlref is a library that allows to load Yaml documents and resolve JSON-pointer references inside them. ymlref versions up to 0.1.1 allow code injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ymlref'}, 'ecosystem_specific': {'affected_functions': ['ymlref.api.load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20133'}, {'type': 'WEB', 'url': 'https://github.com/dexter2206/ymlref/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/dexter2206/ymlref'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:33Z', 'nvd_published_at': None}
1.4.0
GHSA-3v44-382q-55f4
2021-08-31T21:30:36Z
2018-12-21T17:50:13Z
null
['CVE-2017-15713']
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
Vulnerability in Apache Hadoop 0.23.x, 2.x before 2.7.5, 2.8.x before 2.8.3, and 3.0.0-alpha through 3.0.0-beta1 allows a cluster user to expose private files owned by the user running the MapReduce job history server process. The malicious user can construct a configuration file containing XML directives that reference sensitive files on the MapReduce job history server host.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15713'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3v44-382q-55f4'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a790a251ace7213bde9f69777dedb453b1a01a6d18289c14a61d4f91@%3Cgeneral.hadoop.apache.org%3E'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:25Z', 'nvd_published_at': None}
1.4.0
GHSA-mxr5-p36v-479m
2022-09-14T22:11:51Z
2018-12-19T19:24:03Z
null
['CVE-2018-9207']
Unrestricted Upload of File with Dangerous Type in jquery-file-upload
Arbitrary file upload in jQuery Upload File <= 4.0.2
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery-file-upload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-9207'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mxr5-p36v-479m'}, {'type': 'WEB', 'url': 'http://www.vapidlabs.com/advisory.php?v=206'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:40Z', 'nvd_published_at': None}
1.4.0
GHSA-rmm5-g63h-m6g9
2022-09-14T22:12:35Z
2018-12-19T19:24:39Z
null
['CVE-2018-20059']
Improper Restriction of XML External Entity Reference in pippo-core
jaxb/JaxbEngine.java in Pippo 1.11.0 allows XXE.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'ro.pippo:pippo-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20059'}, {'type': 'WEB', 'url': 'https://github.com/pippo-java/pippo/issues/486'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rmm5-g63h-m6g9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pippo-java/pippo'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:08Z', 'nvd_published_at': None}
1.4.0
GHSA-8p8g-f9vg-r7xr
2022-09-14T22:25:15Z
2018-12-21T17:48:19Z
null
['CVE-2018-1000850']
Directory Traversal vulnerability in Square Retrofit
Square Retrofit versions from (including) 2.0 to 2.5.0 (excluding) contain a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter. By manipulating the URL an attacker could add or delete resources otherwise unavailable to her. This attack appears to be exploitable via an encoded path parameter on POST, PUT or DELETE request. This vulnerability appears to have been fixed in 2.5.0 and later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.squareup.retrofit2:retrofit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000850'}, {'type': 'WEB', 'url': 'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8p8g-f9vg-r7xr'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/retrofit'}, {'type': 'WEB', 'url': 'https://github.com/square/retrofit/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://ihacktoprotect.com/post/retrofit-path-traversal/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:16Z', 'nvd_published_at': None}
1.4.0
GHSA-j5rj-g695-342r
2023-08-25T21:22:06Z
2018-12-20T22:01:54Z
null
['CVE-2018-1000842']
Fat Free CRM vulnerable to Cross-site Scripting
FatFreeCRM version `<=0.14.1`, `>=0.15.0 <=0.15.1`, `>=0.16.0 <=0.16.3`, `>=0.17.0 <=0.17.2`, and `==0.18.0` contains a Cross Site Scripting (XSS) vulnerability in [commit 6d60bc8ed010c4eda05d6645c64849f415f68d65](https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa) that can result in Javascript execution. This attack appears to be exploitable via Content with Javascript payload will be executed on end user browsers when they visit the page. This vulnerability appears to have been fixed in 0.18.1, 0.17.3, 0.16.4, 0.15.2, and 0.14.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.15.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.16.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.17.0'}, {'fixed': '0.17.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.1'}]}], 'versions': ['0.18.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000842'}, {'type': 'WEB', 'url': 'https://github.com/asteinhauser/fat_free_crm/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa'}, {'type': 'PACKAGE', 'url': 'https://github.com/asteinhauser/fat_free_crm/'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/wiki/XSS-Vulnerability-%282018-10-27%29'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fat_free_crm/CVE-2018-1000842.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/fat-free-crm-users/TxsdZXSe7Jc'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:09Z', 'nvd_published_at': '2018-12-20T15:29:00Z'}
1.4.0
GHSA-rqj9-cq6j-958r
2022-09-14T22:27:02Z
2018-12-21T17:50:26Z
null
['CVE-2018-11766']
Arbitrary Command Execution in Hadoop
In Apache Hadoop 2.7.4 to 2.7.6, the security fix for CVE-2016-6811 is incomplete. A user who can escalate to yarn user can possibly run arbitrary commands as root user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.4'}, {'fixed': '2.7.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11766'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rqj9-cq6j-958r'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106035'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:32Z', 'nvd_published_at': None}
1.4.0
GHSA-j379-9jr9-w5cq
2022-09-14T22:25:34Z
2018-12-21T17:48:26Z
null
['CVE-2018-1000844']
XML External Entity (XXE) vulnerability in Square Retrofit
Square Open Source Retrofit versions prior to commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437 contain a XML External Entity (XXE) vulnerability in JAXB. An attacker could use this to remotely read files from the file system or to perform SSRF. This vulnerability appears to have been fixed in commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.squareup.retrofit2:retrofit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000844'}, {'type': 'WEB', 'url': 'https://github.com/square/retrofit/pull/2735'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j379-9jr9-w5cq'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/retrofit'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:45Z', 'nvd_published_at': None}
1.4.0
GHSA-q2qw-rmrh-vv42
2023-06-30T19:52:40Z
2018-12-05T17:24:27Z
null
['CVE-2018-16476']
Improper Access Control in activejob
A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activejob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activejob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.7.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activejob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.6.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activejob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.1.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16476'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/970b0d754be7c71a760d9b807eea32297fd838e3'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0600'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activejob/CVE-2018-16476.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/rubyonrails-security/FL4dSdzr2zw/zjKVhF4qBAAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/FL4dSdzr2zw'}, {'type': 'WEB', 'url': 'https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/'}]
{'cwe_ids': ['CWE-284', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:29Z', 'nvd_published_at': None}
1.4.0
GHSA-894g-6j7q-2hx6
2022-03-26T00:47:37Z
2018-12-19T19:23:52Z
null
['CVE-2018-16516']
Cross site scripting in flask-admin
helpers.py in Flask-Admin 1.5.2 has Reflected XSS via a crafted URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'flask-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16516'}, {'type': 'WEB', 'url': 'https://github.com/flask-admin/flask-admin/pull/1699'}, {'type': 'WEB', 'url': 'https://github.com/flask-admin/flask-admin/commit/8af10e0b022464fdcb2da3d0ea5bbd2f11c0acd1'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-894g-6j7q-2hx6'}, {'type': 'PACKAGE', 'url': 'https://github.com/flask-admin/flask-admin'}, {'type': 'WEB', 'url': 'https://github.com/flask-admin/flask-admin/releases/tag/v1.5.3'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIYCWIH3BRLI2QNC53CQXLKVP27X7EH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZU2VKULURVXEU4YFTLMBQGYMPSXQ4MBN/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:59Z', 'nvd_published_at': None}
1.4.0
GHSA-fvm3-cfvj-gxqq
2021-07-19T15:57:47Z
2018-12-21T17:47:47Z
null
['CVE-2016-3092']
High severity vulnerability that affects commons-fileupload:commons-fileupload
The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-fileupload:commons-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3092'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0456'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1349468'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fvm3-cfvj-gxqq'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201705-09'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190212-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN89379547/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2068.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2069.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2070.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2071.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2072.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2599.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2807.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2808.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0457.html'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1743480'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1743722'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1743738'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1743742'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-7.html'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-8.html'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-9.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3609'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3611'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3614'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/91453'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1036427'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1036900'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1037029'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039606'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-3024-1'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-3027-1'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:21Z', 'nvd_published_at': '2016-07-04T22:59:00Z'}
1.4.0
GHSA-p69g-f978-xxv9
2022-09-14T22:14:38Z
2018-12-20T22:01:39Z
null
['CVE-2018-1000843']
Cross-Site Request Forgery (CSRF) in Luigi
Luigi version prior to version 2.8.0; after commit 53b52e12745075a8acc016d33945d9d6a7a6aaeb; after GitHub PR spotify/luigi/pull/1870 contains a Cross ite Request Forgery (CSRF) vulnerability in API endpoint: /api/<method> that can result in Task metadata such as task name, id, parameter, etc. will be leaked to unauthorized users. This attack appear to be exploitable via The victim must visit a specially crafted webpage from the network where their Luigi server is accessible.. This vulnerability appears to have been fixed in 2.8.0 and later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'luigi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000843'}, {'type': 'WEB', 'url': 'https://github.com/spotify/luigi/pull/1870'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p69g-f978-xxv9'}, {'type': 'PACKAGE', 'url': 'https://github.com/spotify/luigi'}, {'type': 'WEB', 'url': 'https://github.com/spotify/luigi/blob/2.7.9/luigi/server.py#L67'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/luigi-user/ZgfRTpBsVUY'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:19Z', 'nvd_published_at': None}
1.4.0
GHSA-8j39-fgfp-vxh8
2023-09-11T20:39:33Z
2018-12-19T19:25:04Z
null
['CVE-2018-20094']
XXL-CONF Path Traversal vulnerability
An issue was discovered in XXL-CONF 1.6.0. There is a path traversal vulnerability via `../` in the keys parameter that can download any configuration file, related to `ConfController.java` and `PropUtil.java`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-conf-admin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20094'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-conf/issues/61'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-conf'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-conf/blob/6726dfe7979ea6d8fb983771471cde69789de632/xxl-conf-admin/src/main/java/com/xxl/conf/admin/controller/ConfController.java'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:45Z', 'nvd_published_at': None}
1.4.0
GHSA-xx68-jfcg-xmmf
2023-09-29T12:05:17Z
2018-12-21T17:51:42Z
null
['CVE-2014-0050']
Commons FileUpload Denial of service vulnerability
MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-fileupload:commons-fileupload'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0-RC1'}, {'fixed': '8.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.52'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.50'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0050'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/29384723d8d9645b87e05be9fa369a4deeb78b9c'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1062337'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xx68-jfcg-xmmf'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1565143'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1565163'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1565169'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-7.html'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-8.html'}, {'type': 'WEB', 'url': 'http://advisories.mageia.org/MGASA-2014-0110.html'}, {'type': 'WEB', 'url': 'http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN14876762/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907@apache.org%3E'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=143136844732487&w=2'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0252.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0253.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0400.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Dec/23'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/57915'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/58075'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/58976'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59039'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59041'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59183'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59184'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59185'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59187'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59232'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59399'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59492'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59500'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59725'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/60475'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/60753'}, {'type': 'WEB', 'url': 'http://svn.apache.org/r1565143'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-7.html'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-8.html'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21669554'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21675432'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676091'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676092'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676401'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676403'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676405'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676410'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676656'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676853'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21677691'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21677724'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21681214'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2856'}, {'type': 'WEB', 'url': 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html'}, {'type': 'WEB', 'url': 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html'}, {'type': 'WEB', 'url': 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html'}, {'type': 'WEB', 'url': 'http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:084'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/532549/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/534161/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/65400'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2130-1'}, {'type': 'WEB', 'url': 'http://www.vmware.com/security/advisories/VMSA-2014-0007.html'}, {'type': 'WEB', 'url': 'http://www.vmware.com/security/advisories/VMSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://www.vmware.com/security/advisories/VMSA-2014-0012.html'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:56Z', 'nvd_published_at': '2014-04-01T06:27:00Z'}
1.4.0
GHSA-6x48-j4x4-cqw3
2022-09-14T22:27:39Z
2018-12-21T17:50:29Z
null
['CVE-2018-8009']
Path Traversal in Hadoop
Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}], 'versions': ['3.1.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8009'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6x48-j4x4-cqw3'}, {'type': 'WEB', 'url': 'https://hadoop.apache.org/cve_list.html#cve-2018-8009-http-cve-mitre-org-cgi-bin-cvename-cgi-name-cve-2018-8009-zip-slip-impact-on-apache-hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a1c227745ce30acbcf388c5b0cc8423e8bf495d619cd0fa973f7f38d@%3Cuser.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105927'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:31Z', 'nvd_published_at': None}
1.4.0
GHSA-c289-47qf-rvrr
2022-09-14T22:23:27Z
2018-12-21T17:46:03Z
null
['CVE-2018-1000855']
Cross Site Scripting (XSS) vulnerability in easymon
easymon version 1.4 and earlier contains a Cross Site Scripting (XSS) vulnerability in Endpoint where monitoring is mounted that can result in Reflected XSS that affects Firefox. Can be used to steal cookies, depending on the cookie settings.. This attack appear to be exploitable via The victim must click on a crafted URL that contains the XSS payload. This vulnerability appears to have been fixed in 1.4.1 and later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'easymon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000855'}, {'type': 'WEB', 'url': 'https://github.com/basecamp/easymon/issues/26'}, {'type': 'WEB', 'url': 'https://github.com/basecamp/easymon/pull/25'}, {'type': 'PACKAGE', 'url': 'https://github.com/basecamp/easymon'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/easymon/CVE-2018-1000855.yml'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:57Z', 'nvd_published_at': None}
1.4.0
GHSA-99qr-9cc9-fv2x
2021-09-07T21:13:38Z
2018-12-21T17:50:03Z
null
['CVE-2017-3166']
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
In Apache Hadoop versions 2.6.1 to 2.6.5, 2.7.0 to 2.7.3, and 3.0.0-alpha1, if a file in an encryption zone with access permissions that make it world readable is localized via YARN's localization mechanism, that file will be stored in a world-readable location and can be shared freely with any application that requests to localize that file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3166'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-99qr-9cc9-fv2x'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2e16689b44bdd1976b6368c143a4017fc7159d1f2d02a5d54fe9310f@%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}]
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:07Z', 'nvd_published_at': None}
1.4.0
GHSA-3jq8-jg75-rqv6
2022-09-14T22:22:35Z
2018-12-20T22:02:45Z
null
['CVE-2018-17195']
Cleartext Transmission of Sensitive Information in Apache nifi
The template upload API endpoint accepted requests from different domain when sent in conjunction with ARP spoofing + man in the middle (MiTM) attack, resulting in a CSRF attack. The required attack vector is complex, requiring a scenario with client certificate authentication, same subnet access, and injecting malicious code into an unprotected (plaintext HTTP) website which the targeted user later visits, but the possible damage warranted a Severe severity level. Mitigation: The fix to apply Cross-Origin Resource Sharing (CORS) policy request filtering was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17195'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3jq8-jg75-rqv6'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018-17195'}]
{'cwe_ids': ['CWE-319', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:22Z', 'nvd_published_at': None}
1.4.0
GHSA-mq8p-h798-xcrp
2022-09-14T22:26:37Z
2018-12-21T17:50:20Z
null
['CVE-2017-15718']
Exposure of Sensitive Information in Hadoop
The YARN NodeManager in Apache Hadoop 2.7.3 and 2.7.4 can leak the password for credential store provider used by the NodeManager to YARN Applications.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.3'}, {'fixed': '2.7.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15718'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mq8p-h798-xcrp'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/773c93c2d8a6a52bbe97610c2b1c2ad205b970e1b8c04fb5b2fccad6@%3Cgeneral.hadoop.apache.org%3E'}]
{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:00Z', 'nvd_published_at': None}
1.4.0
GHSA-2xpp-75vr-22vq
2022-09-14T22:21:45Z
2018-12-20T22:02:24Z
null
['CVE-2018-17192']
Improper Restriction of Rendered UI Layers or Frames in Apache nifif
The X-Frame-Options headers were applied inconsistently on some HTTP responses, resulting in duplicate or missing security headers. Some browsers would interpret these results incorrectly, allowing clickjacking attacks. Mitigation: The fix to consistently apply the security headers was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17192'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2xpp-75vr-22vq'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018-17192'}]
{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:23Z', 'nvd_published_at': None}