schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 14
228
| details
stringlengths 48
1.45k
| severity
stringlengths 2
78
| affected
stringlengths 79
6.96k
| references
stringlengths 143
6.38k
| database_specific
stringlengths 131
174
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-cpp2-q66x-fq44 | 2023-09-06T20:04:12Z | 2018-08-06T21:39:12Z | null | ['CVE-2017-16139'] | Directory Traversal in jikes | Affected versions of `jikes` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jikes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.0.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16139'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jikes'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cpp2-q66x-fq44'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/476'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4x37-5rh2-hp8c | 2023-09-11T16:17:57Z | 2018-08-29T23:50:59Z | null | ['CVE-2017-16067'] | node-opencv is malware | The `node-opencv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-opencv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16067'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4x37-5rh2-hp8c'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/506'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2m39-62fm-q8r3 | 2023-01-31T01:55:03Z | 2018-08-15T13:22:23Z | null | ['CVE-2018-3737'] | Regular Expression Denial of Service in sshpk | Versions of `sshpk` before 1.13.2 or 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys.
## Recommendation
Update to version 1.13.2, 1.14.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'sshpk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3737'}, {'type': 'WEB', 'url': 'https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1bccf86d3efb2fb83c14e3f9957'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319593'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2m39-62fm-q8r3'}, {'type': 'WEB', 'url': 'https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/606'}] | {'cwe_ids': ['CWE-185', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:29Z', 'nvd_published_at': '2018-06-07T02:29:00Z'} |
1.4.0 | GHSA-cqxw-3p7v-p9gr | 2022-04-26T20:43:37Z | 2018-08-21T17:08:03Z | null | ['CVE-2016-10345'] | Phusion Passenger uses a known /tmp filename | In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10345'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441'}, {'type': 'WEB', 'url': 'https://blog.phusion.nl/2017/01/10/passenger-5-1-1/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cqxw-3p7v-p9gr'}, {'type': 'PACKAGE', 'url': 'https://github.com/phusion/passenger/'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/blob/stable-5.1/CHANGELOG'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2016-10345.yml'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-562c-5r94-xh97 | 2023-08-07T16:04:04Z | 2018-08-23T19:10:40Z | null | ['CVE-2018-1000656'] | Flask is vulnerable to Denial of Service via incorrect encoding of JSON data | The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'flask'}, 'ecosystem_specific': {'affected_functions': ['flask.json.loads', 'flask.wrappers.Request.get_json']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000656'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/pull/2691'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/commit/b178e89e4456e777b1a7ac6d7199052d0dfdbbbe'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-562c-5r94-xh97'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/flask'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/releases/tag/0.12.3'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190221-0001/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4378-1/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f523-2f5j-gfcg | 2023-09-13T19:38:19Z | 2018-08-29T23:04:14Z | null | ['CVE-2017-16115'] | Regular Expression Denial of Service in timespan | Affected versions of `timespan` are vulnerable to a regular expression denial of service when parsing dates.
The amplification for this vulnerability is significant, with 50,000 characters resulting in the event loop being blocked for around 10 seconds.
## Recommendation
No direct patch is available for this vulnerability.
Currently, the best available solution is to use a functionally equivalent alternative package.
It is also sufficient to ensure that user input is not being passed into `timespan`, or that the maximum length of such user input is drastically reduced. Limiting the input length to 150 characters should be sufficient in most cases. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'timespan'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16115'}, {'type': 'WEB', 'url': 'https://github.com/indexzero/TimeSpan.js/issues/10'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f523-2f5j-gfcg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/533'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gxpj-cx7g-858c | 2023-09-13T23:02:31Z | 2018-08-09T20:18:07Z | null | ['CVE-2017-16137'] | Regular Expression Denial of Service in debug | Affected versions of `debug` are vulnerable to regular expression denial of service when untrusted user input is passed into the `o` formatter.
As it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue.
## Recommendation
Version 2.x.x: Update to version 2.6.9 or later.
Version 3.x.x: Update to version 3.1.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'debug'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.9'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'debug'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16137'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/debug/issues/501'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/debug/pull/504'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gxpj-cx7g-858c'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/534'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-72hv-rp4q-q7f3 | 2023-09-11T18:38:16Z | 2018-08-29T23:57:14Z | null | ['CVE-2017-16060'] | babelcli is malware | The `babelcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'babelcli'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16060'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-72hv-rp4q-q7f3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/499'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8wg9-92fr-6j7v | 2023-09-07T18:18:38Z | 2018-08-15T18:50:31Z | null | ['CVE-2016-10648'] | marionette-socket-host downloads Resources over HTTP | Affected versions of `marionette-socket-host` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `marionette-socket-host`.
## Recommendation
No patch is currently available for this vulnerability, and the package author has removed the package from their Github account.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'marionette-socket-host'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10648'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8wg9-92fr-6j7v'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla-b2g/marionette-socket-host'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/252'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9wv8-jgw4-4g28 | 2020-06-16T21:33:56Z | 2018-08-15T20:04:13Z | 2020-06-16T21:29:46Z | [] | High severity vulnerability that affects festivaltts4r | Withdrawn, accidental duplicate publish.
The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) to_speech or (2) to_mp3 method in lib/festivaltts4r/festival4r.rb. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'festivaltts4r'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10194'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9wv8-jgw4-4g28'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ph8p-2g97-9654 | 2021-01-08T18:21:22Z | 2018-08-15T19:27:25Z | null | ['CVE-2016-10643'] | Downloads Resources over HTTP in jstestdriver | Affected versions of `jstestdriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jstestdriver`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2011.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jstestdriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10643'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ph8p-2g97-9654'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/244'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vcfp-ppqw-mf23 | 2023-09-11T18:26:51Z | 2018-08-17T20:20:46Z | null | ['CVE-2016-10686'] | fis-sass-all downloads Resources over HTTP | Affected versions of `fis-sass-all` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-sass-all`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'fis-sass-all'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10686'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vcfp-ppqw-mf23'}, {'type': 'PACKAGE', 'url': 'https://github.com/fis-dev/fis-sass'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/287'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vv6q-9cfw-4c83 | 2023-09-12T18:30:03Z | 2018-08-29T23:20:27Z | null | ['CVE-2017-16079'] | smb is malware | The `smb` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'smb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16079'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vv6q-9cfw-4c83'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/518'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pxqr-8v54-m2hj | 2023-07-04T00:05:37Z | 2018-08-08T22:30:35Z | null | ['CVE-2016-10522'] | Cross-site request forgery in rails_admin | rails_admin ruby gem <v1.1.1 is vulnerable to cross-site request forgery (CSRF) attacks. Non-GET methods were not validating CSRF tokens and, as a result, an attacker could hypothetically gain access to the application administrative endpoints exposed by the gem. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails_admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10522'}, {'type': 'WEB', 'url': 'https://github.com/railsadminteam/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pxqr-8v54-m2hj'}, {'type': 'PACKAGE', 'url': 'https://github.com/railsadminteam/rails_admin'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2016-10522.yml'}, {'type': 'WEB', 'url': 'https://www.sourceclear.com/registry/security/cross-site-request-forgery-csrf-/ruby/sid-3173'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x7q3-67vc-wvcf | 2023-09-13T22:57:47Z | 2018-08-15T19:05:14Z | null | ['CVE-2016-10645'] | grunt-images downloads Resources over HTTP | Affected versions of `grunt-images` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-images`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2013.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'grunt-images'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10645'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x7q3-67vc-wvcf'}, {'type': 'PACKAGE', 'url': 'https://github.com/gcpantazis/grunt-images'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/255'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4j59-hfw6-6w7h | 2021-09-16T20:54:42Z | 2018-08-15T19:30:48Z | null | ['CVE-2016-10642'] | Downloads Resources over HTTP in cmake | Affected versions of `cmake` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cmake`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available, or installing the cmake binaries via a system package manager, such as `apt-get`.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'cmake'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10642'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4j59-hfw6-6w7h'}, {'type': 'PACKAGE', 'url': 'https://github.com/stanley-gu/cmake'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/233'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-694m-jhr9-pf77 | 2023-01-21T03:36:04Z | 2018-08-13T20:46:41Z | null | ['CVE-2018-1000211'] | Doorkeeper subject to Incorrect Permission Assignment | Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000211'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/issues/891'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/pull/1119'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-694m-jhr9-pf77'}, {'type': 'PACKAGE', 'url': 'https://github.com/doorkeeper-gem/doorkeeper'}] | {'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m2q3-53fq-7h66 | 2023-03-14T20:41:45Z | 2018-08-28T22:33:51Z | null | ['CVE-2015-7314'] | Gollum Exposure of Sensitive Information | The Precious module in gollum before 4.0.1 allows remote attackers to read arbitrary files by leveraging the lack of a certain temporary-file check. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'gollum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7314'}, {'type': 'WEB', 'url': 'https://github.com/gollum/gollum/issues/1070'}, {'type': 'WEB', 'url': 'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1'}, {'type': 'PACKAGE', 'url': 'https://github.com/gollum/gollum'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN27548431/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000149'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/09/22/12'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f499-jv47-9wxf | 2023-09-06T20:04:27Z | 2018-08-06T21:40:02Z | null | ['CVE-2017-16164'] | Directory Traversal in desafio | Affected versions of `desafio` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
no patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] | [{'package': {'ecosystem': 'npm', 'name': 'desafio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16164'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/desafio'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f499-jv47-9wxf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/397'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-36p7-xjw8-h6f2 | 2023-08-28T10:31:36Z | 2018-08-21T17:08:30Z | null | ['CVE-2016-5697'] | Ruby-saml allows attackers to perform XML signature wrapping attacks | ruby-saml prior to version 1.3.0 is vulnerable to an XML signature wrapping attack in the specific scenario where there was a signature that referenced at the same time 2 elements (but past the scheme validator process since 1 of the element was inside the encrypted assertion).
ruby-saml users must update to 1.3.0, which implements 3 extra validations to mitigate this kind of attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-saml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5697'}, {'type': 'WEB', 'url': 'https://github.com/onelogin/ruby-saml/commit/a571f52171e6bfd87db59822d1d9e8c38fb3b995'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-saml/CVE-2016-5697.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/06/24/3'}] | {'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-82x2-g7vr-39wq | 2020-06-17T15:14:38Z | 2018-08-13T20:48:09Z | 2020-06-17T15:14:38Z | [] | Moderate severity vulnerability that affects web-console | Withdrawn, accidental duplicate publish.
request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'web-console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3224'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-82x2-g7vr-39wq'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pv4c-p2j5-38j4 | 2023-09-11T22:06:04Z | 2018-08-13T15:02:15Z | null | ['CVE-2018-3774'] | Open Redirect in url-parse | Versions of `url-parse` before 1.4.3 returns the wrong hostname which could lead to Open Redirect, Server Side Request Forgery (SSRF), or Bypass Authentication Protocol vulnerabilities.
## Recommendation
Update to version 1.4.3 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3774'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/53b1794e54d0711ceb52505e0f74145270570d5a'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/d7b582ec1243e8024e60ac0b62d2569c939ef5de'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/384029'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pv4c-p2j5-38j4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/678'}] | {'cwe_ids': ['CWE-425'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w655-w578-99pq | 2020-06-17T15:15:17Z | 2018-08-21T17:09:08Z | 2020-06-17T15:15:17Z | [] | High severity vulnerability that affects espeak-ruby | Withdrawn, accidental duplicate publish.
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'espeak-ruby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10193'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w655-w578-99pq'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8474-rc7c-wrhp | 2020-06-17T15:14:40Z | 2018-08-08T22:29:10Z | 2020-06-17T15:14:40Z | [] | High severity vulnerability that affects safemode | Withdrawn, accidental duplicate publish.
The safemode rubygem, as used in Foreman, versions 1.3.2 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7540'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8474-rc7c-wrhp'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fr52-4hqw-p27f | 2022-04-26T18:24:04Z | 2018-08-21T19:03:26Z | null | ['CVE-2016-4658'] | Nokogiri does not forbid namespace nodes in XPointer ranges | xpointer.c in libxml2 before 2.9.5 (as used in nokogiri before 1.7.1 amongst other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4658'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-37'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT207141'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT207142'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT207143'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT207170'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html'}] | {'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mp78-r56v-45qc | 2023-08-29T11:29:21Z | 2018-08-28T22:34:31Z | null | ['CVE-2015-1866'] | ember-source vulnerable to Cross-site Scripting | Cross-site scripting (XSS) vulnerability in Ember.js 1.10.x before 1.10.1 and 1.11.x before 1.11.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.1'}]}], 'versions': ['1.10.0']}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1866'}, {'type': 'WEB', 'url': 'https://emberjs.com/blog/2015/04/14/security-and-bugfix-releases-ember-1-10-1-1-11-2-1-11-3.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/Acidburn0zzz/ember.js'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ember-source/CVE-2015-1866.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ember-security/nbntfs2EbRU'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228155301/http://www.securityfocus.com/bid/74185'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/04/14/11'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2j55-pcw5-x4h2 | 2023-01-18T21:33:05Z | 2018-08-13T15:02:49Z | null | ['CVE-2018-3779'] | active-support impersonates 'activesupport' gem | The `active-support` ruby gem gem is malware and duplicates the official `activesupport` (no hyphen) gem, but adds a compiled extension. The extension attempts to resolve a base64 encoded domain (29faea63.planfhntage.de), downloads a payload, and executes.
This trojan horse gem could allow a remote attacker to execute arbitrary code on the system, caused by containing a malicious backdoor. An attacker could exploit this vulnerability to execute arbitrary code on the system. No version of this gem should be considered safe. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'active-support'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3779'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/392311'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2j55-pcw5-x4h2'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7322-9mx6-5j2m | 2023-01-23T20:45:35Z | 2018-08-15T20:04:30Z | null | ['CVE-2015-5147'] | redcarpet Buffer Overflow vulnerability | Stack-based buffer overflow in the `header_anchor` function in the HTML renderer in Redcarpet before 3.3.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'redcarpet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5147'}, {'type': 'WEB', 'url': 'https://github.com/vmg/redcarpet/commit/2cee777c1e5babe8a1e2683d31ea75cc4afe55fb'}, {'type': 'PACKAGE', 'url': 'https://github.com/vmg/redcarpet'}, {'type': 'WEB', 'url': 'https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150711061256/http://www.securityfocus.com/bid/75508'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/29/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/30/10'}] | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-995j-587r-259w | 2020-06-16T21:42:03Z | 2018-08-13T20:46:58Z | 2020-06-16T21:28:00Z | [] | Moderate severity vulnerability that affects rack-mini-profiler | Withdrawn, accidental duplicate publish.
The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack-mini-profiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4442'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-995j-587r-259w'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9wcm-rrvh-qjc8 | 2020-06-17T15:14:43Z | 2018-08-15T20:03:53Z | 2020-06-17T15:14:43Z | [] | High severity vulnerability that affects colorscore | Withdrawn, accidental duplicate publish.
The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'colorscore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9wcm-rrvh-qjc8'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hm48-76wh-q86v | 2020-06-17T15:14:48Z | 2018-08-21T19:03:17Z | 2020-06-17T15:14:48Z | [] | High severity vulnerability that affects activerecord | Withdrawn, accidental duplicate publish.
activerecord/lib/active_record/relation/query_methods.rb in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes create_with calls. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3514'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hm48-76wh-q86v'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4q53-fqhc-cr46 | 2023-08-29T10:51:34Z | 2018-08-28T22:33:42Z | null | ['CVE-2014-0046'] | ember-source Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in the link-to helper in Ember.js 1.2.x before 1.2.2, 1.3.x before 1.3.2, and 1.4.x before 1.4.0-beta.6, when used in non-block form, allows remote attackers to inject arbitrary web script or HTML via the title attribute. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0-beta.1'}, {'fixed': '1.4.0-beta.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0046'}, {'type': 'WEB', 'url': 'https://github.com/emberjs/ember.js/commit/45ee8df2a0efc0afe233d6b9b17045782a2e6b2d'}, {'type': 'WEB', 'url': 'https://github.com/emberjs/ember.js/commit/94b28b8773acf894c4d7d7fccf4411a706292436'}, {'type': 'WEB', 'url': 'https://github.com/emberjs/ember.js/commit/ab3199e68e1d0fc3c8f7f453cd38c51fe02af90b'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/91242'}, {'type': 'PACKAGE', 'url': 'https://github.com/emberjs/ember.js'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ember-source/CVE-2014-0046.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ'}, {'type': 'WEB', 'url': 'http://emberjs.com/blog/2014/02/07/ember-security-releases.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/56965'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/02/14/6'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/65579'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:44Z', 'nvd_published_at': '2014-02-27T15:55:00Z'} |
1.4.0 | GHSA-8225-6cvr-8pqp | 2023-09-08T23:55:11Z | 2018-08-09T20:13:01Z | null | ['CVE-2017-16129'] | superagent vulnerable to zip bomb attacks | Affected versions of `superagent` do not check the post-decompression size of ZIP compressed HTTP responses prior to decompressing. This results in the package being vulnerable to a [ZIP bomb](https://en.wikipedia.org/wiki/Zip_bomb) attack, where an extremely small ZIP file becomes many orders of magnitude larger when decompressed.
This may result in unrestrained CPU/Memory/Disk consumption, causing a denial of service condition.
## Recommendation
Update to version 3.7.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'superagent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16129'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/superagent/issues/1259'}, {'type': 'WEB', 'url': 'https://en.wikipedia.org/wiki/Zip_bomb'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8225-6cvr-8pqp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/479'}] | {'cwe_ids': ['CWE-400', 'CWE-409'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wqg7-vrj7-v82h | 2023-09-07T22:27:31Z | 2018-08-31T06:22:50Z | null | ['CVE-2018-11615'] | Mosca REDoS Vulnerability | This vulnerability allows remote attackers to deny service on vulnerable installations of npm mosca 2.8.1. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of topics. A crafted regular expression can cause the broker to crash. An attacker can leverage this vulnerability to deny access to the target system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mosca'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11615'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wqg7-vrj7-v82h'}, {'type': 'WEB', 'url': 'https://zerodayinitiative.com/advisories/ZDI-18-583'}] | {'cwe_ids': ['CWE-185', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-534w-937m-v7x3 | 2023-06-09T20:17:46Z | 2018-08-03T21:04:02Z | null | ['CVE-2018-3777'] | restforce vulnerable to Improper Input Validation | A flaw in how restforce constructs URLs may allow an attacker to inject additional parameters into Salesforce API requests.
Impact
------
This flaw is only exploitable in applications that pass user input directly to restforce's select, find, describe, update, upsert, and destroy methods.
Vulnerable code might look like:
```ruby
client.select('SomeSalesForceObject', params[:some-id],
...)
```
In such an application, attackers could pass `0016000000MRatd/describe` as a request parameter, causing the server to make a request to a different endpoint than the server is designed to handle. Since the Salesforce REST API supports overriding HTTP methods via a request parameter, an attacker could also cause the client's `select()` method to modify data, by passing `0016000000MRatd/?_HttpMethod=PATCH&other-query-params=...`.
Workarounds
------
If possible, applications should track salesforce IDs internally, rather than passing user-supplied IDs to salesforce. Such practice mitigates this vulnerability, and in general is desirable for ensuring strong access control. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'restforce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3777'}, {'type': 'WEB', 'url': 'https://github.com/restforce/restforce/pull/392'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-534w-937m-v7x3'}, {'type': 'PACKAGE', 'url': 'https://github.com/restforce/restforce'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/restforce/CVE-2018-3777.yml'}] | {'cwe_ids': ['CWE-172', 'CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:51Z', 'nvd_published_at': '2018-08-03T20:29:00Z'} |
1.4.0 | GHSA-xrr4-74mc-rpjc | 2022-04-26T18:22:26Z | 2018-08-21T17:01:29Z | null | ['CVE-2011-2765'] | Pyro mishandles pid files in temporary directory locations and opening the pid file as root | pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2765'}, {'type': 'WEB', 'url': 'https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/631912'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xrr4-74mc-rpjc'}, {'type': 'PACKAGE', 'url': 'https://github.com/irmen/Pyro3'}, {'type': 'WEB', 'url': 'https://pythonhosted.org/Pyro/12-changes.html'}] | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xjqg-9jvg-fgx2 | 2023-03-13T23:53:36Z | 2018-08-21T19:03:04Z | null | ['CVE-2015-5312'] | Nokogiri subject to DoS via libxml2 vulnerability | The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 (as used in nokogiri before 1.6.7.1) does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.7.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5312'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1276693'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-5312.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/aSbgDiwb24s'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-37'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206166'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206167'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206168'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206169'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=145382616617563&w=2'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2549.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2550.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3430'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2834-1'}, {'type': 'WEB', 'url': 'http://xmlsoft.org/news.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6fjr-m7v6-fpg9 | 2023-09-06T18:29:27Z | 2018-08-06T21:41:38Z | null | ['CVE-2017-16204'] | jquey is malware | The `jquey` package is malware that attempts to discover and exfiltrate sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `jquey` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jquey'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16204'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6fjr-m7v6-fpg9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/544'}] | {'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m6wh-m8m8-6xx5 | 2023-09-06T20:07:33Z | 2018-08-06T20:05:28Z | null | ['CVE-2017-16202'] | cofeescript is malware | The `cofeescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `cofeescript` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well. | [] | [{'package': {'ecosystem': 'npm', 'name': 'cofeescript'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16202'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m6wh-m8m8-6xx5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/541'}] | {'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hg4c-rgvm-964g | 2021-12-02T23:19:05Z | 2018-08-15T20:02:53Z | null | ['CVE-2016-8640'] | SQL Injection in pycsw | A SQL injection vulnerability in pycsw all versions before 2.0.2, 1.10.5 and 1.8.6 that leads to read and extract of any data from any table in the pycsw database that the database user has access to. Also on PostgreSQL (at least) it is possible to perform updates/inserts/deletes and database modifications to any table the database user has access to. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pycsw'}, 'ecosystem_specific': {'affected_functions': ['pycsw.ogc.csw.csw2.Csw2.getrecords']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pycsw'}, 'ecosystem_specific': {'affected_functions': ['pycsw.ogc.csw.csw2.Csw2.getrecords']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pycsw'}, 'ecosystem_specific': {'affected_functions': ['pycsw.ogc.csw.csw2.Csw2.getrecords']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8640'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pycsw/pull/474/files'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pycsw/commit/522873e5ce48bb9cbd4e7e8168ca881ce709c222'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pycsw/commit/69546e13527c82e4f9191769215490381ad511b2'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pycsw/commit/daaf09b4b920708a415be3c7f446739661ba3753'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hg4c-rgvm-964g'}, {'type': 'PACKAGE', 'url': 'https://github.com/geopython/pycsw'}, {'type': 'WEB', 'url': 'https://patch-diff.githubusercontent.com/raw/geopython/pycsw/pull/474.patch'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2016/q4/406'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/94302'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-44vc-fpcg-5cc5 | 2020-06-16T21:30:40Z | 2018-08-08T22:29:49Z | 2020-06-16T20:57:19Z | [] | Moderate severity vulnerability that affects safemode | Withdrawn, accidental duplicate publish.
The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3693'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-44vc-fpcg-5cc5'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xh56-3f5w-9h25 | 2023-09-07T18:51:58Z | 2018-08-29T23:40:01Z | null | ['CVE-2017-16071'] | nodemailer-js is malware | The `nodemailer-js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodemailer-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16071'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xh56-3f5w-9h25'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/510'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2hxv-mx8x-mcj9 | 2023-08-28T10:47:48Z | 2018-08-28T22:34:22Z | null | ['CVE-2015-4619'] | Spina gem vulnerable to Cross-site request forgery (CSRF) vulnerability | Cross-site request forgery (CSRF) vulnerability in Spina before commit bfe44f289e336f80b6593032679300c493735e75. `Spina::ApplicationController` actions didn't have CSRF protection. This causes a CSRF vulnerability across the entire engine which includes administrative functionality such as creating users, changing passwords, and media management. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'spina'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.29'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4619'}, {'type': 'WEB', 'url': 'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75'}, {'type': 'PACKAGE', 'url': 'https://github.com/denkGroot/Spina'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spina/CVE-2015-4619.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/16/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/16/20'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/75216'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q7wx-62r7-j2x7 | 2023-03-14T19:07:20Z | 2018-08-08T22:31:12Z | null | ['CVE-2015-1819'] | Nokogiri vulnerable to libxml XML Entity Expansion | The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.6.0'}, {'fixed': '1.6.6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.6.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1819'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1374'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=213f1fe0d76d30eaed6e5853057defc43e6df2c9'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-1819.yml'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201507-08'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-37'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206166'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206167'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206168'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT206169'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172710.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172943.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1419.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2550.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3430'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2812-1'}, {'type': 'WEB', 'url': 'http://xmlsoft.org/news.html'}] | {'cwe_ids': ['CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rp28-29ch-gh92 | 2023-09-08T23:13:40Z | 2018-08-06T21:30:15Z | null | ['CVE-2017-16222'] | Directory Traversal in elding | Affected versions of `elding` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
This vulnerability only affects files that have file extensions - i.e. `/etc/passwd` will be treated as a directory, and a read attempt on `/etc/passwd/index.js` will be made and subsequently fail.
**Example request:**
```http
GET /../../../../../../../../../../some_app_dir/secrets.json HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'elding'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16222'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/elding'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rp28-29ch-gh92'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/415'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j866-8vxx-27hx | 2023-09-08T23:02:21Z | 2018-08-29T23:43:53Z | null | ['CVE-2017-16072'] | nodemailer.js is malware | The `nodemailer.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodemailer.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16072'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j866-8vxx-27hx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/511'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4g54-95xv-f353 | 2023-09-11T18:34:27Z | 2018-08-29T23:16:56Z | null | ['CVE-2017-16075'] | http-proxy.js is malware | The `http-proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'http-proxy.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16075'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4g54-95xv-f353'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/514'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2gw2-8q9w-cw8p | 2023-01-25T22:55:50Z | 2018-08-31T14:55:43Z | null | ['CVE-2018-1000201'] | Ruby-ffi has a DLL loading issue | ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ffi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.24'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000201'}, {'type': 'WEB', 'url': 'https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a'}, {'type': 'WEB', 'url': 'https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c'}, {'type': 'PACKAGE', 'url': 'https://github.com/ffi/ffi'}, {'type': 'WEB', 'url': 'https://github.com/ffi/ffi/releases/tag/1.9.24'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ffi/CVE-2018-1000201.yml'}] | {'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4cmx-hrq9-c23p | 2023-04-21T18:30:53Z | 2018-08-15T20:03:22Z | null | ['CVE-2018-3778'] | Improper Authorization in aedes | Versions of `aedes` before 0.35.1 does not respect its own authorization rules when a client sets a `Last Will`.
## Recommendation
Update to version 0.35.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'aedes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.35.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3778'}, {'type': 'WEB', 'url': 'https://github.com/moscajs/aedes/issues/211'}, {'type': 'WEB', 'url': 'https://github.com/moscajs/aedes/issues/212'}, {'type': 'WEB', 'url': 'https://github.com/moscajs/aedes/commit/ffbc1702bb24b596afbb96407cc6db234a4044a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/moscajs/aedes'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/457.json'}] | {'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:11Z', 'nvd_published_at': '2018-08-08T20:29:00Z'} |
1.4.0 | GHSA-phmw-pv3f-vvx7 | 2021-12-02T23:09:12Z | 2018-08-13T20:47:44Z | 2020-06-17T15:14:58Z | [] | Moderate severity vulnerability that affects paperclip | Withdrawn, accidental duplicate publish.
The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'paperclip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2963'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-phmw-pv3f-vvx7'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/paperclip'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-72fg-jqhx-c68p | 2023-09-11T18:37:42Z | 2018-08-06T21:33:31Z | null | ['CVE-2017-16224'] | Open Redirect in st | st is a module for serving static files.
An attacker is able to craft a request that results in an `HTTP 301` (redirect) to an entirely different domain.
A request for: `http://some.server.com//nodesecurity.org/%2e%2e` would result in a 301 to `//nodesecurity.org/%2e%2e` which most browsers treat as a proper redirect as `//` is translated into the current schema being used.
**Mitigating factor:**
In order for this to work, `st` must be serving from the root of a server (`/`) rather than the typical sub directory (`/static/`) and the redirect URL will end with some form of URL encoded `..` ("%2e%2e", "%2e.", ".%2e").
Code example (provided by Xin Gao):
[example.js]
```js
var st = require('st')
var http = require('http')
http.createServer(st(process.cwd())).listen(1337)
```
```shell
$ curl -v http://localhost:1337//cve.mitre.com/%2e%2e
* Trying ::1...
* TCP_NODELAY set
* Connected to localhost (::1) port 1337 (#0)
> GET //cve.mitre.com/%2e%2e HTTP/1.1
> Host: localhost:1337
> User-Agent: curl/7.54.0
> Accept: */*
>
< HTTP/1.1 301 Moved Permanently
< cache-control: public, max-age=600
< last-modified: Fri, 13 Oct 2017 22:56:33 GMT
< etag: "16777220-46488904-1507935393000"
< location: //cve.mitre.com/%2e%2e/
< Date: Fri, 13 Oct 2017 22:56:41 GMT
< Connection: keep-alive
< Content-Length: 30
<
* Connection #0 to host localhost left intact
```
## Recommendation
Update to version 1.2.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'st'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16224'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-72fg-jqhx-c68p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/547'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8gg6-3r63-25m8 | 2023-08-29T12:09:29Z | 2018-08-15T20:03:37Z | null | ['CVE-2015-8968'] | git-fastclone permits arbitrary shell command execution from .gitmodules | git-fastclone before 1.0.1 permits arbitrary shell command execution from .gitmodules. If an attacker can instruct a user to run a recursive clone from a repository they control, they can get a client to run an arbitrary shell command. Alternately, if an attacker can MITM an unencrypted git clone, they could exploit this. The ext command will be run if the repository is recursively cloned or if submodules are updated. This attack works when cloning both local and remote repositories. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'git-fastclone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8968'}, {'type': 'WEB', 'url': 'https://github.com/square/git-fastclone/pull/2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/104465'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/git-fastclone/CVE-2015-8968.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/git-fastclone'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227213019/http://www.securityfocus.com/bid/81433'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8h55-49jm-739x | 2023-09-11T16:34:56Z | 2018-08-29T23:21:46Z | null | ['CVE-2017-16109'] | Directory Traversal in easyquick | Affected versions of `easyquick` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'easyquick'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16109'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/easyquick'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8h55-49jm-739x'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/373'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-38f5-ghc2-fcmv | 2023-09-12T18:38:55Z | 2018-08-21T17:02:43Z | null | ['CVE-2018-3784'] | Code Injection in cryo | All versions of `cryo` are vulnerable to code injection due to an Insecure implementation of deserialization.
## Proof of concept
```js
var Cryo = require('cryo');
var frozen = '{"root":"_CRYO_REF_3","references":[{"contents":{},"value":"_CRYO_FUNCTION_function () {console.log(\\"defconrussia\\"); return 1111;}"},{"contents":{},"value":"_CRYO_FUNCTION_function () {console.log(\\"defconrussia\\");return 2222;}"},{"contents":{"toString":"_CRYO_REF_0","valueOf":"_CRYO_REF_1"},"value":"_CRYO_OBJECT_"},{"contents":{"__proto__":"_CRYO_REF_2"},"value":"_CRYO_OBJECT_"}]}'
var hydrated = Cryo.parse(frozen);
console.log(hydrated);
```
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'cryo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3784'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/350418'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38f5-ghc2-fcmv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/690'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5mjw-6jrh-hvfq | 2023-09-11T16:18:58Z | 2018-08-06T21:37:06Z | null | ['CVE-2017-16226'] | Sandbox Breakout / Arbitrary Code Execution in static-eval | Affected versions of `static-eval` pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package.
## Proof of concept
```js
var evaluate = require('static-eval');
var parse = require('esprima').parse;
var src = '(function(){console.log(process.pid)})()';
var ast = parse(src).body[0].expression;
var res = evaluate(ast, {});
// Will print the process id
```
## Recommendation
Update to version 2.0.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'static-eval'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16226'}, {'type': 'WEB', 'url': 'https://github.com/substack/static-eval/pull/18'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5mjw-6jrh-hvfq'}, {'type': 'WEB', 'url': 'https://maustin.net/articles/2017-10/static_eval'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/548'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p65h-233c-jxvm | 2021-01-08T18:23:55Z | 2018-08-15T19:03:59Z | null | ['CVE-2016-10646'] | Downloads Resources over HTTP in resourcehacker | Affected versions of `resourcehacker` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `resourcehacker`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'resourcehacker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10646'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p65h-233c-jxvm'}, {'type': 'WEB', 'url': 'https://github.com/felicienfrancois/node-resourcehacker/blob/master/scripts/install.js#L4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/254'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mf6w-45cf-qhmp | 2023-01-26T21:13:16Z | 2018-08-15T20:04:44Z | null | ['CVE-2015-8969'] | Git-fastclone passes user modifiable strings directly to a shell command | git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to `cd ` and `git clone ` commands in the library. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'git-fastclone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8969'}, {'type': 'WEB', 'url': 'https://github.com/square/git-fastclone/pull/5'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/105190'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/git-fastclone/CVE-2015-8969.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/git-fastclone'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20161108132238/http://www.securityfocus.com/bid/81433'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5hxw-r847-qfwp | 2023-09-07T18:31:39Z | 2018-08-29T23:47:07Z | null | ['CVE-2017-16066'] | opencv.js is malware | opencv.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'opencv.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16066'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5hxw-r847-qfwp'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hv9c-qwqg-qj3v | 2022-08-02T18:03:09Z | 2018-08-23T19:12:08Z | null | ['CVE-2018-15685'] | Electron webPreferences vulnerability can be used to perform remote code execution | GitHub Electron 1.7.15, 1.8.7, 2.0.7, and 3.0.0-beta.6, in certain scenarios involving IFRAME elements and "nativeWindowOpen: true" or "sandbox: true" options, is affected by a webPreferences vulnerability that can be leveraged to perform remote code execution.
More information to determine if you are impacted can be found on the [electron blog](https://electronjs.org/blog/web-preferences-fix).
## Recommendation
Upgrade Electron to >=3.0.0-beta.7, >=2.0.8, >=1.8.8, or >=1.7.16. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.16'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-beta.1'}, {'fixed': '3.0.0-beta.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15685'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/519a02d8d4d28e8a467acb40fb26172a80c9454f'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/80221e52d93a96ea704cb6748ead669c55cff504'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/bab968ca776be28791e4dddfd50c86bd5fae62fa'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/ef0a6d9a1c96efc4657c6dd3a6624eba969f095b'}, {'type': 'WEB', 'url': 'https://electronjs.org/blog/web-preferences-fix'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}, {'type': 'WEB', 'url': 'https://www.contrastsecurity.com/security-influencers/cve-2018-15685'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45272/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/732'}] | {'cwe_ids': ['CWE-1188'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h3c2-x77c-7pvr | 2023-02-03T20:44:46Z | 2018-08-21T17:03:33Z | null | ['CVE-2018-3785'] | Command Injection in git-dummy-commit | A command injection in git-dummy-commit v1.3.0 allows os level commands to be executed due to an unescaped parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'git-dummy-commit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3785'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/341710'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h3c2-x77c-7pvr'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:34Z', 'nvd_published_at': '2018-08-17T13:29:00Z'} |
1.4.0 | GHSA-36vc-cw62-fqvr | 2023-09-05T22:35:19Z | 2018-08-27T19:07:23Z | null | ['CVE-2017-16078'] | Shadowsock is malware | The `shadowsock` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [] | [{'package': {'ecosystem': 'npm', 'name': 'shadowsock'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16078'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-36vc-cw62-fqvr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/517'}] | {'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qj73-v688-wqxf | 2020-08-31T18:26:04Z | 2018-08-29T23:19:13Z | null | ['CVE-2017-16076'] | Hijacked Environment Variables in proxy.js | The `proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [] | [{'package': {'ecosystem': 'npm', 'name': 'proxy.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16076'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qj73-v688-wqxf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/515'}] | {'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8f64-q7jc-ccgp | 2023-01-31T01:53:19Z | 2018-08-08T22:25:57Z | null | ['CVE-2018-3773'] | metascraper before v5.2.0 vulnerable to stored cross-site scripting | Versions of `metascraper` prior to 5.2.0 are vulnerable to stored cross-site scripting (XSS).
## Recommendation
Upgrade to version 5.2.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'metascraper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3773'}, {'type': 'WEB', 'url': 'https://github.com/microlinkhq/metascraper/pull/169'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/309367'}, {'type': 'PACKAGE', 'url': 'https://github.com/microlinkhq/metascraper'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/603'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:23Z', 'nvd_published_at': '2018-07-30T18:29:00Z'} |
1.4.0 | GHSA-mc9x-v9xg-25pm | 2023-09-12T18:43:18Z | 2018-08-06T20:12:54Z | null | ['CVE-2017-16205'] | coffescript is malware | The `coffescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `coffescript` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'coffescript'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16205'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mc9x-v9xg-25pm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/542'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hgg3-g7gr-66r7 | 2023-08-08T10:35:15Z | 2018-08-27T19:52:28Z | null | ['CVE-2018-15560'] | PyCryptodome Integer overflow vulnerability | PyCryptodome before 3.6.6 has an integer overflow in the data_len variable in AESNI.c, related to the AESNI_encrypt and AESNI_decrypt functions, leading to the mishandling of messages shorter than 16 bytes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pycryptodome'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15560'}, {'type': 'WEB', 'url': 'https://github.com/Legrandin/pycryptodome/issues/198'}, {'type': 'PACKAGE', 'url': 'https://github.com/Legrandin/pycryptodome'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hgg3-g7gr-66r7'}, {'type': 'WEB', 'url': 'https://whitehatck01.blogspot.com/2018/08/integer-overflow-vulnerability-in.html'}] | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m8h6-m9p5-p2f8 | 2021-12-02T23:15:03Z | 2018-08-13T20:49:01Z | 2020-06-16T21:45:29Z | [] | Moderate severity vulnerability that affects activerecord | Withdrawn, accidental duplicate publish.
Active Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.7.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6317'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m8h6-m9p5-p2f8'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c2m4-w5hm-vqjw | 2023-09-13T22:48:21Z | 2018-08-29T23:05:46Z | null | ['CVE-2017-16074'] | crossenv is malware | The `crossenv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'crossenv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16074'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c2m4-w5hm-vqjw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/513'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jhq3-57xh-6643 | 2021-09-14T19:42:55Z | 2018-08-21T17:03:59Z | null | ['CVE-2018-3783'] | Privilege Escalation due to Blind NoSQL Injection in flintcms | Versions of `flintcms` before version 1.1.10 are vulnerable to account takeover due to blind MongoDB injection in the password reset.
## Recommendation
Update to version 1.1.10 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'flintcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3783'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/386807'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhq3-57xh-6643'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/689'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gvpx-9459-w3mj | 2021-09-13T13:35:54Z | 2018-05-23T20:37:46Z | null | ['CVE-2018-11093'] | Cross-Site Scripting in @ckeditor/ckeditor5-link | Versions of `status-board` prior to 10.0.1 are vulnerable to Cross-Site Scripting. The `_createPreviewButton()` function fails to sanitize the `href` attribute of a created `<a>` tag. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 10.0.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-link'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '10.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11093'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5-link/commit/8cb782eceba10fc481e4021cb5d25b2a85d1b04e'}, {'type': 'WEB', 'url': 'https://ckeditor.com/blog/CKEditor-5-v10.0.1-released/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gvpx-9459-w3mj'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor5-link'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5-link/blob/master/CHANGELOG.md#1001-2018-05-22'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5LINK-72892'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1154'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-43fp-vwwg-qgv6 | 2023-09-11T20:45:18Z | 2018-12-20T22:02:32Z | null | ['CVE-2018-17194'] | Apache NiFi Improper Input Validation vulnerability | When a client request to a cluster node was replicated to other nodes in the cluster for verification, the Content-Length was forwarded. On a DELETE request, the body was ignored, but if the initial request had a Content-Length value other than 0, the receiving nodes would wait for the body and eventually timeout. Mitigation: The fix to check DELETE requests and overwrite non-zero Content-Length header values was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-framework-cluster'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17194'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/1baead6f525046a613fc4fe494a0d193776ea70f,'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018-17194'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4qq9-rrq6-48ff | 2021-09-01T18:01:38Z | 2018-12-20T22:02:39Z | null | ['CVE-2018-17193'] | Moderate severity vulnerability that affects org.apache.nifi:nifi | The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17193'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4qq9-rrq6-48ff'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018-17193'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5p52-j8pw-j7x5 | 2022-09-14T22:12:54Z | 2018-12-19T19:24:52Z | null | ['CVE-2018-20000'] | Improper Restriction of XML External Entity Reference in bedework:bw-webdav | Apereo Bedework bw-webdav before 4.0.3 allows XXE attacks, as demonstrated by an invite-reply document that reads a local file, related to webdav/servlet/common/MethodBase.java and webdav/servlet/common/PostRequestPars.java. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bedework:bw-webdav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20000'}, {'type': 'WEB', 'url': 'https://github.com/Bedework/bw-webdav/pull/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bedework/bw-webdav'}, {'type': 'WEB', 'url': 'https://github.com/Bedework/bw-webdav/compare/bw-webdav-4.0.2...bw-webdav-4.0.3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5p52-j8pw-j7x5'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jxm5-5xcw-h57q | 2022-11-15T16:07:28Z | 2018-12-20T22:02:17Z | null | ['CVE-2018-1000823'] | exist-db:exist-core XML External Entity (XXE) vulnerability | exist version <= 5.0.0-RC4 contains a XML External Entity (XXE) vulnerability in XML Parser for REST Server that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.exist-db:exist-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000823'}, {'type': 'WEB', 'url': 'https://github.com/eXist-db/exist/issues/2180'}, {'type': 'WEB', 'url': 'https://github.com/eXist-db/exist/pull/2243'}, {'type': 'WEB', 'url': 'https://github.com/eXist-db/exist/pull/2247'}, {'type': 'WEB', 'url': 'https://github.com/eXist-db/exist/commit/1c3f0aec14d00bdbca175713af70cb7c7b868e9f'}, {'type': 'WEB', 'url': 'https://github.com/eXist-db/exist/commit/b210f9fbf379b68842f2b055dda80d7e7479e96f'}, {'type': 'WEB', 'url': 'https://0dd.zone/2018/10/27/exist-XXE/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jxm5-5xcw-h57q'}, {'type': 'PACKAGE', 'url': 'https://github.com/eXist-db/exist'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cq27-v7xp-c356 | 2022-09-14T22:11:10Z | 2018-12-14T18:51:38Z | null | ['CVE-2013-7459'] | Buffer Overflow in pycrypto | Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pycrypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7459'}, {'type': 'WEB', 'url': 'https://github.com/dlitz/pycrypto/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1409754'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cq27-v7xp-c356'}, {'type': 'PACKAGE', 'url': 'https://github.com/dlitz/pycrypto'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C6BWNADPLKDBBQBUT3P75W7HAJCE7M3B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJ37R2YLX56YZABFNAOWV4VTHTGYREAE/'}, {'type': 'WEB', 'url': 'https://pony7.fr/ctf:public:32c3:cryptmsg'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201702-14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/12/27/8'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95122'}] | {'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mr4x-c4v9-x729 | 2023-08-30T23:20:56Z | 2018-12-20T22:01:46Z | null | ['CVE-2018-1000814'] | aiohttp-session creates non-expiring sessions | aio-libs aiohttp-session version 2.6.0 and earlier contains a Other/Unknown vulnerability in EncryptedCookieStorage and NaClCookieStorage that can result in Non-expiring sessions / Infinite lifespan. This attack appear to be exploitable via Recreation of a cookie post-expiry with the same value. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'aiohttp-session'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000814'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/issues/325'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/pull/331'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/pull/331/commits/308c839deac8ed9be169397c1328f72c75ac793e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mr4x-c4v9-x729'}, {'type': 'PACKAGE', 'url': 'https://github.com/aio-libs/aiohttp-session'}] | {'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xmvg-w4f9-99r7 | 2022-09-14T22:23:07Z | 2018-12-20T22:02:51Z | null | ['CVE-2018-1000836'] | XML External Entity (XXE) vulnerability in bw-calendar-engine | bw-calendar-engine version <= bw-calendar-engine-3.12.0 contains a XML External Entity (XXE) vulnerability in IscheduleClient XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via Man in the Middle or malicious server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bedework.caleng:bw-calendar-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.12.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000836'}, {'type': 'WEB', 'url': 'https://github.com/Bedework/bw-calendar-engine/issues/3'}, {'type': 'WEB', 'url': 'https://0dd.zone/2018/10/28/bw-calendar-engine-XXE-MitM/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bedework/bw-calendar-engine'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xmvg-w4f9-99r7'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9448-c9wq-jg9v | 2022-09-14T22:28:00Z | 2018-12-21T17:49:33Z | null | ['CVE-2018-11786'] | Improper Privilege Management in Apache Karaf | In Apache Karaf prior to 4.2.0 release, if the sshd service in Karaf is left on so an administrator can manage the running instance, any user with rights to the Karaf console can pivot and read/write any file on the file system to which the Karaf process user has access. This can be locked down a bit by using chroot to change the root directory to protect files outside of the Karaf install directory; it can be further locked down by defining a security manager policy that limits file system access to those directories beneath the Karaf home that are necessary for the system to run. However, this still allows anyone with ssh access to the Karaf process to read and write a large number of files as the Karaf process user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11786'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9448-c9wq-jg9v'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/KARAF-5427'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5b7ac762c6bbe77ac5d9389f093fc6dbf196c36d788e3d7629e6c1d9@%3Cdev.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://karaf.apache.org/security/cve-2018-11786.txt'}] | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wg5w-vv93-3f7w | 2021-09-21T19:44:14Z | 2018-12-20T22:01:18Z | null | ['CVE-2018-11799'] | Moderate severity vulnerability that affects org.apache.oozie:oozie-core | Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user's name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.oozie:oozie-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11799'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wg5w-vv93-3f7w'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/347e7a8cb86014b7ca37e49eb00b8d088203bdc0bcfb4799f8e5955a@%3Cuser.oozie.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106266'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gf2j-7qwg-4f5x | 2022-09-14T22:26:11Z | 2018-12-21T17:48:45Z | null | ['CVE-2018-14637'] | Improper Authentication in Keycloak | The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14637'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gf2j-7qwg-4f5x'}] | {'cwe_ids': ['CWE-285', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gfv6-cj92-g3hx | 2023-08-08T12:26:56Z | 2018-12-21T17:46:39Z | null | ['CVE-2018-1000872'] | PyKMIP Denial of service vulnerability | OpenKMIP PyKMIP version All versions before 0.8.0 contains a CWE 399: Resource Management Errors (similar issue to CVE-2015-5262) vulnerability in PyKMIP server that can result in DOS: the server can be made unavailable by one or more clients opening all of the available sockets. This attack appear to be exploitable via A client or clients open sockets with the server and then never close them. This vulnerability appears to have been fixed in 0.8.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pykmip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000872'}, {'type': 'WEB', 'url': 'https://github.com/OpenKMIP/PyKMIP/issues/430'}, {'type': 'WEB', 'url': 'https://github.com/OpenKMIP/PyKMIP/commit/3a7b880bdf70d295ed8af3a5880bab65fa6b3932'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenKMIP/PyKMIP'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gfv6-cj92-g3hx'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8r8j-xvfj-36f9 | 2023-08-07T16:14:35Z | 2018-12-19T19:25:14Z | null | ['CVE-2018-20133'] | Code injection in ymlref | ymlref is a library that allows to load Yaml documents and resolve JSON-pointer references inside them. ymlref versions up to 0.1.1 allow code injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ymlref'}, 'ecosystem_specific': {'affected_functions': ['ymlref.api.load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20133'}, {'type': 'WEB', 'url': 'https://github.com/dexter2206/ymlref/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/dexter2206/ymlref'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3v44-382q-55f4 | 2021-08-31T21:30:36Z | 2018-12-21T17:50:13Z | null | ['CVE-2017-15713'] | Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main | Vulnerability in Apache Hadoop 0.23.x, 2.x before 2.7.5, 2.8.x before 2.8.3, and 3.0.0-alpha through 3.0.0-beta1 allows a cluster user to expose private files owned by the user running the MapReduce job history server process. The malicious user can construct a configuration file containing XML directives that reference sensitive files on the MapReduce job history server host. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15713'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3v44-382q-55f4'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a790a251ace7213bde9f69777dedb453b1a01a6d18289c14a61d4f91@%3Cgeneral.hadoop.apache.org%3E'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mxr5-p36v-479m | 2022-09-14T22:11:51Z | 2018-12-19T19:24:03Z | null | ['CVE-2018-9207'] | Unrestricted Upload of File with Dangerous Type in jquery-file-upload | Arbitrary file upload in jQuery Upload File <= 4.0.2 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-file-upload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-9207'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mxr5-p36v-479m'}, {'type': 'WEB', 'url': 'http://www.vapidlabs.com/advisory.php?v=206'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rmm5-g63h-m6g9 | 2022-09-14T22:12:35Z | 2018-12-19T19:24:39Z | null | ['CVE-2018-20059'] | Improper Restriction of XML External Entity Reference in pippo-core | jaxb/JaxbEngine.java in Pippo 1.11.0 allows XXE. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'ro.pippo:pippo-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20059'}, {'type': 'WEB', 'url': 'https://github.com/pippo-java/pippo/issues/486'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rmm5-g63h-m6g9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pippo-java/pippo'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8p8g-f9vg-r7xr | 2022-09-14T22:25:15Z | 2018-12-21T17:48:19Z | null | ['CVE-2018-1000850'] | Directory Traversal vulnerability in Square Retrofit | Square Retrofit versions from (including) 2.0 to 2.5.0 (excluding) contain a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter. By manipulating the URL an attacker could add or delete resources otherwise unavailable to her. This attack appears to be exploitable via an encoded path parameter on POST, PUT or DELETE request. This vulnerability appears to have been fixed in 2.5.0 and later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.squareup.retrofit2:retrofit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000850'}, {'type': 'WEB', 'url': 'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8p8g-f9vg-r7xr'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/retrofit'}, {'type': 'WEB', 'url': 'https://github.com/square/retrofit/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://ihacktoprotect.com/post/retrofit-path-traversal/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j5rj-g695-342r | 2023-08-25T21:22:06Z | 2018-12-20T22:01:54Z | null | ['CVE-2018-1000842'] | Fat Free CRM vulnerable to Cross-site Scripting | FatFreeCRM version `<=0.14.1`, `>=0.15.0 <=0.15.1`, `>=0.16.0 <=0.16.3`, `>=0.17.0 <=0.17.2`, and `==0.18.0` contains a Cross Site Scripting (XSS) vulnerability in [commit 6d60bc8ed010c4eda05d6645c64849f415f68d65](https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa) that can result in Javascript execution. This attack appears to be exploitable via Content with Javascript payload will be executed on end user browsers when they visit the page. This vulnerability appears to have been fixed in 0.18.1, 0.17.3, 0.16.4, 0.15.2, and 0.14.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.15.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.16.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.17.0'}, {'fixed': '0.17.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.1'}]}], 'versions': ['0.18.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000842'}, {'type': 'WEB', 'url': 'https://github.com/asteinhauser/fat_free_crm/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa'}, {'type': 'PACKAGE', 'url': 'https://github.com/asteinhauser/fat_free_crm/'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/wiki/XSS-Vulnerability-%282018-10-27%29'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fat_free_crm/CVE-2018-1000842.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/fat-free-crm-users/TxsdZXSe7Jc'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:09Z', 'nvd_published_at': '2018-12-20T15:29:00Z'} |
1.4.0 | GHSA-rqj9-cq6j-958r | 2022-09-14T22:27:02Z | 2018-12-21T17:50:26Z | null | ['CVE-2018-11766'] | Arbitrary Command Execution in Hadoop | In Apache Hadoop 2.7.4 to 2.7.6, the security fix for CVE-2016-6811 is incomplete. A user who can escalate to yarn user can possibly run arbitrary commands as root user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.4'}, {'fixed': '2.7.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11766'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rqj9-cq6j-958r'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106035'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j379-9jr9-w5cq | 2022-09-14T22:25:34Z | 2018-12-21T17:48:26Z | null | ['CVE-2018-1000844'] | XML External Entity (XXE) vulnerability in Square Retrofit | Square Open Source Retrofit versions prior to commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437 contain a XML External Entity (XXE) vulnerability in JAXB. An attacker could use this to remotely read files from the file system or to perform SSRF. This vulnerability appears to have been fixed in commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.squareup.retrofit2:retrofit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000844'}, {'type': 'WEB', 'url': 'https://github.com/square/retrofit/pull/2735'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j379-9jr9-w5cq'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/retrofit'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q2qw-rmrh-vv42 | 2023-06-30T19:52:40Z | 2018-12-05T17:24:27Z | null | ['CVE-2018-16476'] | Improper Access Control in activejob | A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activejob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activejob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.7.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activejob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.6.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activejob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.1.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16476'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/970b0d754be7c71a760d9b807eea32297fd838e3'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0600'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activejob/CVE-2018-16476.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/rubyonrails-security/FL4dSdzr2zw/zjKVhF4qBAAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/FL4dSdzr2zw'}, {'type': 'WEB', 'url': 'https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/'}] | {'cwe_ids': ['CWE-284', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-894g-6j7q-2hx6 | 2022-03-26T00:47:37Z | 2018-12-19T19:23:52Z | null | ['CVE-2018-16516'] | Cross site scripting in flask-admin | helpers.py in Flask-Admin 1.5.2 has Reflected XSS via a crafted URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'flask-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16516'}, {'type': 'WEB', 'url': 'https://github.com/flask-admin/flask-admin/pull/1699'}, {'type': 'WEB', 'url': 'https://github.com/flask-admin/flask-admin/commit/8af10e0b022464fdcb2da3d0ea5bbd2f11c0acd1'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-894g-6j7q-2hx6'}, {'type': 'PACKAGE', 'url': 'https://github.com/flask-admin/flask-admin'}, {'type': 'WEB', 'url': 'https://github.com/flask-admin/flask-admin/releases/tag/v1.5.3'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIYCWIH3BRLI2QNC53CQXLKVP27X7EH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZU2VKULURVXEU4YFTLMBQGYMPSXQ4MBN/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fvm3-cfvj-gxqq | 2021-07-19T15:57:47Z | 2018-12-21T17:47:47Z | null | ['CVE-2016-3092'] | High severity vulnerability that affects commons-fileupload:commons-fileupload | The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-fileupload:commons-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3092'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0456'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1349468'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fvm3-cfvj-gxqq'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201705-09'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190212-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN89379547/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2068.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2069.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2070.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2071.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2072.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2599.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2807.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2808.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0457.html'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1743480'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1743722'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1743738'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc?view=revision&revision=1743742'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-7.html'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-8.html'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-9.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3609'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3611'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3614'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/91453'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1036427'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1036900'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1037029'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039606'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-3024-1'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-3027-1'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:21Z', 'nvd_published_at': '2016-07-04T22:59:00Z'} |
1.4.0 | GHSA-p69g-f978-xxv9 | 2022-09-14T22:14:38Z | 2018-12-20T22:01:39Z | null | ['CVE-2018-1000843'] | Cross-Site Request Forgery (CSRF) in Luigi | Luigi version prior to version 2.8.0; after commit 53b52e12745075a8acc016d33945d9d6a7a6aaeb; after GitHub PR spotify/luigi/pull/1870 contains a Cross ite Request Forgery (CSRF) vulnerability in API endpoint: /api/<method> that can result in Task metadata such as task name, id, parameter, etc. will be leaked to unauthorized users. This attack appear to be exploitable via The victim must visit a specially crafted webpage from the network where their Luigi server is accessible.. This vulnerability appears to have been fixed in 2.8.0 and later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'luigi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000843'}, {'type': 'WEB', 'url': 'https://github.com/spotify/luigi/pull/1870'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p69g-f978-xxv9'}, {'type': 'PACKAGE', 'url': 'https://github.com/spotify/luigi'}, {'type': 'WEB', 'url': 'https://github.com/spotify/luigi/blob/2.7.9/luigi/server.py#L67'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/luigi-user/ZgfRTpBsVUY'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8j39-fgfp-vxh8 | 2023-09-11T20:39:33Z | 2018-12-19T19:25:04Z | null | ['CVE-2018-20094'] | XXL-CONF Path Traversal vulnerability | An issue was discovered in XXL-CONF 1.6.0. There is a path traversal vulnerability via `../` in the keys parameter that can download any configuration file, related to `ConfController.java` and `PropUtil.java`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-conf-admin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20094'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-conf/issues/61'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-conf'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-conf/blob/6726dfe7979ea6d8fb983771471cde69789de632/xxl-conf-admin/src/main/java/com/xxl/conf/admin/controller/ConfController.java'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xx68-jfcg-xmmf | 2023-09-29T12:05:17Z | 2018-12-21T17:51:42Z | null | ['CVE-2014-0050'] | Commons FileUpload Denial of service vulnerability | MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-fileupload:commons-fileupload'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0-RC1'}, {'fixed': '8.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.52'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.50'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0050'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/29384723d8d9645b87e05be9fa369a4deeb78b9c'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1062337'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xx68-jfcg-xmmf'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1565143'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1565163'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1565169'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-7.html'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-8.html'}, {'type': 'WEB', 'url': 'http://advisories.mageia.org/MGASA-2014-0110.html'}, {'type': 'WEB', 'url': 'http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN14876762/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907@apache.org%3E'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=143136844732487&w=2'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0252.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0253.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0400.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Dec/23'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/57915'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/58075'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/58976'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59039'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59041'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59183'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59184'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59185'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59187'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59232'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59399'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59492'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59500'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59725'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/60475'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/60753'}, {'type': 'WEB', 'url': 'http://svn.apache.org/r1565143'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-7.html'}, {'type': 'WEB', 'url': 'http://tomcat.apache.org/security-8.html'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21669554'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21675432'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676091'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676092'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676401'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676403'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676405'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676410'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676656'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676853'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21677691'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21677724'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21681214'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2856'}, {'type': 'WEB', 'url': 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html'}, {'type': 'WEB', 'url': 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html'}, {'type': 'WEB', 'url': 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html'}, {'type': 'WEB', 'url': 'http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:084'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/532549/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/534161/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/65400'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2130-1'}, {'type': 'WEB', 'url': 'http://www.vmware.com/security/advisories/VMSA-2014-0007.html'}, {'type': 'WEB', 'url': 'http://www.vmware.com/security/advisories/VMSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://www.vmware.com/security/advisories/VMSA-2014-0012.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:56Z', 'nvd_published_at': '2014-04-01T06:27:00Z'} |
1.4.0 | GHSA-6x48-j4x4-cqw3 | 2022-09-14T22:27:39Z | 2018-12-21T17:50:29Z | null | ['CVE-2018-8009'] | Path Traversal in Hadoop | Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}], 'versions': ['3.1.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8009'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6x48-j4x4-cqw3'}, {'type': 'WEB', 'url': 'https://hadoop.apache.org/cve_list.html#cve-2018-8009-http-cve-mitre-org-cgi-bin-cvename-cgi-name-cve-2018-8009-zip-slip-impact-on-apache-hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a1c227745ce30acbcf388c5b0cc8423e8bf495d619cd0fa973f7f38d@%3Cuser.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105927'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c289-47qf-rvrr | 2022-09-14T22:23:27Z | 2018-12-21T17:46:03Z | null | ['CVE-2018-1000855'] | Cross Site Scripting (XSS) vulnerability in easymon | easymon version 1.4 and earlier contains a Cross Site Scripting (XSS) vulnerability in Endpoint where monitoring is mounted that can result in Reflected XSS that affects Firefox. Can be used to steal cookies, depending on the cookie settings.. This attack appear to be exploitable via The victim must click on a crafted URL that contains the XSS payload. This vulnerability appears to have been fixed in 1.4.1 and later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'easymon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000855'}, {'type': 'WEB', 'url': 'https://github.com/basecamp/easymon/issues/26'}, {'type': 'WEB', 'url': 'https://github.com/basecamp/easymon/pull/25'}, {'type': 'PACKAGE', 'url': 'https://github.com/basecamp/easymon'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/easymon/CVE-2018-1000855.yml'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-99qr-9cc9-fv2x | 2021-09-07T21:13:38Z | 2018-12-21T17:50:03Z | null | ['CVE-2017-3166'] | Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main | In Apache Hadoop versions 2.6.1 to 2.6.5, 2.7.0 to 2.7.3, and 3.0.0-alpha1, if a file in an encryption zone with access permissions that make it world readable is localized via YARN's localization mechanism, that file will be stored in a world-readable location and can be shared freely with any application that requests to localize that file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3166'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-99qr-9cc9-fv2x'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2e16689b44bdd1976b6368c143a4017fc7159d1f2d02a5d54fe9310f@%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}] | {'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3jq8-jg75-rqv6 | 2022-09-14T22:22:35Z | 2018-12-20T22:02:45Z | null | ['CVE-2018-17195'] | Cleartext Transmission of Sensitive Information in Apache nifi | The template upload API endpoint accepted requests from different domain when sent in conjunction with ARP spoofing + man in the middle (MiTM) attack, resulting in a CSRF attack. The required attack vector is complex, requiring a scenario with client certificate authentication, same subnet access, and injecting malicious code into an unprotected (plaintext HTTP) website which the targeted user later visits, but the possible damage warranted a Severe severity level. Mitigation: The fix to apply Cross-Origin Resource Sharing (CORS) policy request filtering was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17195'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3jq8-jg75-rqv6'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018-17195'}] | {'cwe_ids': ['CWE-319', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mq8p-h798-xcrp | 2022-09-14T22:26:37Z | 2018-12-21T17:50:20Z | null | ['CVE-2017-15718'] | Exposure of Sensitive Information in Hadoop | The YARN NodeManager in Apache Hadoop 2.7.3 and 2.7.4 can leak the password for credential store provider used by the NodeManager to YARN Applications. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.3'}, {'fixed': '2.7.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15718'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mq8p-h798-xcrp'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/773c93c2d8a6a52bbe97610c2b1c2ad205b970e1b8c04fb5b2fccad6@%3Cgeneral.hadoop.apache.org%3E'}] | {'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2xpp-75vr-22vq | 2022-09-14T22:21:45Z | 2018-12-20T22:02:24Z | null | ['CVE-2018-17192'] | Improper Restriction of Rendered UI Layers or Frames in Apache nifif | The X-Frame-Options headers were applied inconsistently on some HTTP responses, resulting in duplicate or missing security headers. Some browsers would interpret these results incorrectly, allowing clickjacking attacks. Mitigation: The fix to consistently apply the security headers was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17192'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2xpp-75vr-22vq'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2018-17192'}] | {'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:23Z', 'nvd_published_at': None} |