Skip to content

Commit 44e6805

Browse files

File tree

6 files changed

+54
-33
lines changed

6 files changed

+54
-33
lines changed

advisories/github-reviewed/2020/06/GHSA-32xf-jwmv-9hf3/GHSA-32xf-jwmv-9hf3.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-32xf-jwmv-9hf3",
4-
"modified": "2022-09-21T19:31:46Z",
4+
"modified": "2025-10-22T17:52:48Z",
55
"published": "2020-06-05T16:13:20Z",
66
"aliases": [
77
"CVE-2020-5410"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H"
1515
}
1616
],
1717
"affected": [
@@ -66,6 +66,10 @@
6666
{
6767
"type": "WEB",
6868
"url": "https://tanzu.vmware.com/security/cve-2020-5410"
69+
},
70+
{
71+
"type": "WEB",
72+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-5410"
6973
}
7074
],
7175
"database_specific": {

advisories/github-reviewed/2020/07/GHSA-gprm-xqrc-c2j3/GHSA-gprm-xqrc-c2j3.json

Lines changed: 20 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gprm-xqrc-c2j3",
4-
"modified": "2024-07-16T20:27:01Z",
4+
"modified": "2025-10-22T17:53:16Z",
55
"published": "2020-07-27T22:51:44Z",
66
"aliases": [
77
"CVE-2020-1956"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H"
1515
}
1616
],
1717
"affected": [
@@ -65,59 +65,63 @@
6565
},
6666
{
6767
"type": "WEB",
68-
"url": "https://community.sonarsource.com/t/apache-kylin-3-0-1-command-injection-vulnerability/25706"
68+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-1956"
6969
},
7070
{
71-
"type": "PACKAGE",
72-
"url": "https://github.com/apache/kylin"
71+
"type": "WEB",
72+
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-570207"
7373
},
7474
{
7575
"type": "WEB",
76-
"url": "https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf%40%3Ccommits.kylin.apache.org%3E"
76+
"url": "https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E"
7777
},
7878
{
7979
"type": "WEB",
80-
"url": "https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E"
80+
"url": "https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0%40%3Ccommits.kylin.apache.org%3E"
8181
},
8282
{
8383
"type": "WEB",
84-
"url": "https://lists.apache.org/thread.html/r1332ef34cf8e2c0589cf44ad269fb1fb4c06addec6297f0320f5111d%40%3Cuser.kylin.apache.org%3E"
84+
"url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cuser.kylin.apache.org%3E"
8585
},
8686
{
8787
"type": "WEB",
88-
"url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb%40%3Cannounce.apache.org%3E"
88+
"url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cdev.kylin.apache.org%3E"
8989
},
9090
{
9191
"type": "WEB",
92-
"url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb%40%3Cdev.kylin.apache.org%3E"
92+
"url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cannounce.apache.org%3E"
9393
},
9494
{
9595
"type": "WEB",
9696
"url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb%40%3Cuser.kylin.apache.org%3E"
9797
},
9898
{
9999
"type": "WEB",
100-
"url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cannounce.apache.org%3E"
100+
"url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb%40%3Cdev.kylin.apache.org%3E"
101101
},
102102
{
103103
"type": "WEB",
104-
"url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cdev.kylin.apache.org%3E"
104+
"url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb%40%3Cannounce.apache.org%3E"
105105
},
106106
{
107107
"type": "WEB",
108-
"url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cuser.kylin.apache.org%3E"
108+
"url": "https://lists.apache.org/thread.html/r1332ef34cf8e2c0589cf44ad269fb1fb4c06addec6297f0320f5111d%40%3Cuser.kylin.apache.org%3E"
109109
},
110110
{
111111
"type": "WEB",
112-
"url": "https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0%40%3Ccommits.kylin.apache.org%3E"
112+
"url": "https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E"
113113
},
114114
{
115115
"type": "WEB",
116-
"url": "https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E"
116+
"url": "https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf%40%3Ccommits.kylin.apache.org%3E"
117+
},
118+
{
119+
"type": "PACKAGE",
120+
"url": "https://github.com/apache/kylin"
117121
},
118122
{
119123
"type": "WEB",
120-
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-570207"
124+
"url": "https://community.sonarsource.com/t/apache-kylin-3-0-1-command-injection-vulnerability/25706"
121125
},
122126
{
123127
"type": "WEB",

advisories/github-reviewed/2020/07/GHSA-rvmq-4x66-q7j3/GHSA-rvmq-4x66-q7j3.json

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rvmq-4x66-q7j3",
4-
"modified": "2024-09-11T19:48:15Z",
4+
"modified": "2025-10-22T17:54:44Z",
55
"published": "2020-07-27T16:57:33Z",
66
"aliases": [
77
"CVE-2020-11978"
@@ -11,11 +11,11 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H"
1515
},
1616
{
1717
"type": "CVSS_V4",
18-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A"
1919
}
2020
],
2121
"affected": [
@@ -56,10 +56,6 @@
5656
"type": "WEB",
5757
"url": "https://github.com/apache/airflow/commit/4d8599e8b0520ff4226fbad72f724afae50fdd08"
5858
},
59-
{
60-
"type": "ADVISORY",
61-
"url": "https://github.com/advisories/GHSA-rvmq-4x66-q7j3"
62-
},
6359
{
6460
"type": "PACKAGE",
6561
"url": "https://github.com/apache/airflow"
@@ -72,6 +68,10 @@
7268
"type": "WEB",
7369
"url": "https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E"
7470
},
71+
{
72+
"type": "WEB",
73+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-11978"
74+
},
7575
{
7676
"type": "WEB",
7777
"url": "http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html"

advisories/github-reviewed/2021/04/GHSA-hhx9-p69v-cx2j/GHSA-hhx9-p69v-cx2j.json

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hhx9-p69v-cx2j",
4-
"modified": "2024-09-11T16:57:39Z",
4+
"modified": "2025-10-22T17:56:14Z",
55
"published": "2021-04-30T17:34:13Z",
66
"aliases": [
77
"CVE-2020-13927"
@@ -11,11 +11,11 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
1515
},
1616
{
1717
"type": "CVSS_V4",
18-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A"
1919
}
2020
],
2121
"affected": [
@@ -80,6 +80,10 @@
8080
"type": "WEB",
8181
"url": "https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc7a35fc099c1aadd%40%3Cdev.airflow.apache.org%3E"
8282
},
83+
{
84+
"type": "WEB",
85+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-13927"
86+
},
8387
{
8488
"type": "WEB",
8589
"url": "http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html"
@@ -93,7 +97,8 @@
9397
"cwe_ids": [
9498
"CWE-1056",
9599
"CWE-1188",
96-
"CWE-287"
100+
"CWE-287",
101+
"CWE-306"
97102
],
98103
"severity": "CRITICAL",
99104
"github_reviewed": true,

advisories/github-reviewed/2022/05/GHSA-g5vf-38cp-4px9/GHSA-g5vf-38cp-4px9.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g5vf-38cp-4px9",
4-
"modified": "2022-10-21T20:58:50Z",
4+
"modified": "2025-10-22T17:53:55Z",
55
"published": "2022-05-24T17:22:57Z",
66
"aliases": [
77
"CVE-2020-1147"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H"
1515
}
1616
],
1717
"affected": [
@@ -257,6 +257,10 @@
257257
"type": "WEB",
258258
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147"
259259
},
260+
{
261+
"type": "WEB",
262+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-1147"
263+
},
260264
{
261265
"type": "WEB",
262266
"url": "https://www.exploitalert.com/view-details.html?id=35992"

advisories/github-reviewed/2022/05/GHSA-qr38-h96j-2j3w/GHSA-qr38-h96j-2j3w.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qr38-h96j-2j3w",
4-
"modified": "2024-10-22T14:53:06Z",
4+
"modified": "2025-10-22T17:55:29Z",
55
"published": "2022-05-24T17:33:18Z",
66
"aliases": [
77
"CVE-2020-16846"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
1515
}
1616
],
1717
"affected": [
@@ -220,6 +220,10 @@
220220
"type": "WEB",
221221
"url": "https://www.debian.org/security/2021/dsa-4837"
222222
},
223+
{
224+
"type": "WEB",
225+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-16846"
226+
},
223227
{
224228
"type": "WEB",
225229
"url": "https://security.gentoo.org/glsa/202011-13"

0 commit comments

Comments
 (0)