Skip to content

Commit

Permalink
Temporary fixes pending database updates (#46)
Browse files Browse the repository at this point in the history
* Temporary fixes pending database updates

github/advisory-database#2995
github/advisory-database#2996

* Apply suggestions from code review
  • Loading branch information
timtebeek authored Nov 27, 2023
1 parent eddc768 commit 310168d
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions src/main/resources/advisories.csv
Original file line number Diff line number Diff line change
Expand Up @@ -2224,7 +2224,7 @@ CVE-2019-14379,2019-08-01T19:18:00Z,"Deserialization of untrusted data in Faster
CVE-2019-14379,2019-08-01T19:18:00Z,"Deserialization of untrusted data in FasterXML jackson-databind","com.fasterxml.jackson.core:jackson-databind",2.9.0,2.9.9.2,CRITICAL,CWE-1321;CWE-915
CVE-2019-14439,2019-08-01T19:18:06Z,"Deserialization of untrusted data in FasterXML jackson-databind","com.fasterxml.jackson.core:jackson-databind",0,2.6.7.3,HIGH,CWE-502
CVE-2019-14439,2019-08-01T19:18:06Z,"Deserialization of untrusted data in FasterXML jackson-databind","com.fasterxml.jackson.core:jackson-databind",2.7.0,2.7.9.6,HIGH,CWE-502
CVE-2019-14439,2019-08-01T19:18:06Z,"Deserialization of untrusted data in FasterXML jackson-databind","com.fasterxml.jackson.core:jackson-databind",2.8.0,2.8.11.14,HIGH,CWE-502
CVE-2019-14439,2019-08-01T19:18:06Z,"Deserialization of untrusted data in FasterXML jackson-databind","com.fasterxml.jackson.core:jackson-databind",2.8.0,2.8.11.4,HIGH,CWE-502
CVE-2019-14439,2019-08-01T19:18:06Z,"Deserialization of untrusted data in FasterXML jackson-databind","com.fasterxml.jackson.core:jackson-databind",2.9.0,2.9.9.2,HIGH,CWE-502
CVE-2019-14540,2019-09-23T18:33:25Z,"Polymorphic Typing issue in FasterXML jackson-databind","com.fasterxml.jackson.core:jackson-databind",0,2.6.7.3,CRITICAL,CWE-502
CVE-2019-14540,2019-09-23T18:33:25Z,"Polymorphic Typing issue in FasterXML jackson-databind","com.fasterxml.jackson.core:jackson-databind",2.7.0,2.8.11.5,CRITICAL,CWE-502
Expand Down Expand Up @@ -3024,10 +3024,10 @@ CVE-2020-27196,2022-02-10T20:23:25Z,"Out-of-bounds Write in Play Framework","com
CVE-2020-27196,2022-02-10T20:23:25Z,"Out-of-bounds Write in Play Framework","com.typesafe.play:play-java",2.8.0,2.8.3,HIGH,CWE-787
CVE-2020-27196,2022-02-10T20:23:25Z,"Out-of-bounds Write in Play Framework",com.typesafe.play:play,2.6.0,2.7.6,HIGH,CWE-787
CVE-2020-27196,2022-02-10T20:23:25Z,"Out-of-bounds Write in Play Framework",com.typesafe.play:play,2.8.0,2.8.3,HIGH,CWE-787
CVE-2020-27216,2020-11-04T17:50:24Z,"Local Temp Directory Hijacking Vulnerability","org.eclipse.jetty:jetty-webapp",0,9.4.33,HIGH,CWE-378;CWE-379;CWE-552
CVE-2020-27216,2020-11-04T17:50:24Z,"Local Temp Directory Hijacking Vulnerability","org.eclipse.jetty:jetty-webapp",0,9.4.33.v20201020,HIGH,CWE-378;CWE-379;CWE-552
CVE-2020-27216,2020-11-04T17:50:24Z,"Local Temp Directory Hijacking Vulnerability","org.eclipse.jetty:jetty-webapp",10.0.0.beta1,10.0.0.beta3,HIGH,CWE-378;CWE-379;CWE-552
CVE-2020-27216,2020-11-04T17:50:24Z,"Local Temp Directory Hijacking Vulnerability","org.eclipse.jetty:jetty-webapp",11.0.0.beta1,11.0.0.beta3,HIGH,CWE-378;CWE-379;CWE-552
CVE-2020-27216,2020-11-04T17:50:24Z,"Local Temp Directory Hijacking Vulnerability","org.mortbay.jetty:jetty-webapp",0,9.4.33,HIGH,CWE-378;CWE-379;CWE-552
CVE-2020-27216,2020-11-04T17:50:24Z,"Local Temp Directory Hijacking Vulnerability","org.mortbay.jetty:jetty-webapp",0,9.4.33.v20201020,HIGH,CWE-378;CWE-379;CWE-552
CVE-2020-27216,2020-11-04T17:50:24Z,"Local Temp Directory Hijacking Vulnerability","org.mortbay.jetty:jetty-webapp",10.0.0.beta1,10.0.0.beta3,HIGH,CWE-378;CWE-379;CWE-552
CVE-2020-27216,2020-11-04T17:50:24Z,"Local Temp Directory Hijacking Vulnerability","org.mortbay.jetty:jetty-webapp",11.0.0.beta1,11.0.0.beta3,HIGH,CWE-378;CWE-379;CWE-552
CVE-2020-27217,2022-02-10T20:22:06Z,"Improper Validation of Specified Quantity in Input in Eclipse Hono","org.eclipse.hono:hono-core",0,1.4.3,HIGH,CWE-1284
Expand Down

0 comments on commit 310168d

Please sign in to comment.