diff --git a/.github/workflows/CI_pipeline.yml b/.github/workflows/CI_pipeline.yml index 2125fa3..53c2391 100644 --- a/.github/workflows/CI_pipeline.yml +++ b/.github/workflows/CI_pipeline.yml @@ -143,7 +143,7 @@ jobs: case "$CURRENT_JAVA_VERSION" in "8") - JAVA_HOME_TO_USE="/opt/hostedtoolcache/Java_Temurin-Hotspot_jdk/8.0.472-8/x64" + JAVA_HOME_TO_USE="/opt/hostedtoolcache/Java_Temurin-Hotspot_jdk/8.0.482-8/x64" ;; "11") JAVA_HOME_TO_USE="/opt/hostedtoolcache/Java_Temurin-Hotspot_jdk/11.0.23-9/x64" diff --git a/data/project_info.csv b/data/project_info.csv index f99637d..5e820fc 100644 --- a/data/project_info.csv +++ b/data/project_info.csv @@ -126,89 +126,89 @@ id,project_slug,cve_id,cwe_id,cwe_name,github_username,github_repository_name,gi 125,apache__kafka_CVE-2025-27818_3.9.0,CVE-2025-27818,CWE-502,Deserialization of Untrusted Data,apache,kafka,3.9.0,https://github.com/apache/kafka,GHSA-76qp-h5mr-frr4,84caaa6e9da06435411510a81fa321d4f99c351f,f745dfdcee2b9851204ddbbcd423626ab87294bc 126,crate__crate_5.5.1_CVE-2023-51982_5.5.1,CVE-2023-51982,CWE-287,Improper Authentication,crate,crate,5.5.1,https://github.com/crate/crate,GHSA-7mgx-gvjw-m3w3,74716bfa6440c2130cd19ed30219189565f897bd,b8b4cec49a1c7eb2b5af568400bd571d194dc03e 127,mapfish__mapfish-print_CVE-2020-15231_3.22.0,CVE-2020-15231,CWE-079,Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),mapfish,mapfish-print,3.22.0,https://github.com/mapfish/mapfish-print,GHSA-w534-q4xf-h5v2,a1911179fd980b9bcd473f2433836a8d5b70e7f6,89155f2506b9cee822e15ce60ccae390a1419d5e -128,keycloak_CVE-2025-7784_26.2.5,CVE-2025-7784,CWE-269,CWE-269: Improper Privilege Management,keycloak,keycloak,26.2.5,https://github.com/keycloak/keycloak,GHSA-27gp-8389-hm4w,, -129,keycloak_CVE-2025-7365_26.0.12,CVE-2025-7365,CWE-346,CWE-346: Origin Validation Error,keycloak,keycloak,26.0.12,https://github.com/keycloak/keycloak,GHSA-xhpr-465j-7p9q,1183157d862f9ccc66e1d6b36018e1aea6d49046,86f0a7864f2bdd991d5e24e6844ddabfce0aa6de -130,opencast_CVE-2025-54380_17.5,CVE-2025-54380,CWE-200,CWE-200: Exposure of Sensitive Information to an Unauthorized Actor,opencast,opencast,17.5,https://github.com/opencast/opencast,GHSA-j63h-hmgw-x4j7,9bda49b6021f665c78a950c589b1a31198e2df49,2d3219113e2b9fadfb06443f5468b1c2157827a6 -131,jena_CVE-2025-49656_jena-5.4.0,CVE-2025-49656,CWE-22,CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),apache,jena,jena-5.4.0,https://github.com/apache/jena,GHSA-jq2c-m8gg-mqcm,35350569b4c1fd432d92e7c92af9597c4400debe,03c5265910aa3a27907bf54f6b4aaae3409afa4f -132,reactor-netty_CVE-2025-22227_v1.2.8,CVE-2025-22227,CWE-200,CWE-200: Exposure of Sensitive Information to an Unauthorized Actor,reactor,reactor-netty,v1.2.8,https://github.com/reactor/reactor-netty,GHSA-4q2v-9p7v-3v22,a60f640c99d13af4e685c368a810c47b7f9fc628,522892307ea89bf24fe634e8bfea35728c9bf411 -133,DSpace_CVE-2025-53622_dspace-7.6.3,CVE-2025-53622,CWE-22,CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),DSpace,DSpace,dspace-7.6.3,https://github.com/DSpace/DSpace,GHSA-vhvx-8xgc-99wf,4da8ed69f44786dc33a3dd9a62ee719a51a4830e,3163ff8b1ea0abe09683a1a94fb5f5bb039983b3 -134,DSpace_CVE-2025-53621_dspace-7.6.3,CVE-2025-53621,CWE-611,CWE-611: Improper Restriction of XML External Entity Reference,DSpace,DSpace,dspace-7.6.3,https://github.com/DSpace/DSpace,GHSA-jjwr-5cfh-7xwh,24357bdd9cf3bd05e4336d0c2d8a0cc7a2932417,28b5f3810fa2b819516e706849a99a9bf5f3de87 -135,cxf_CVE-2025-48795_cxf-3.5.10,CVE-2025-48795,CWE-400,CWE-400: Uncontrolled Resource Consumption,apache,cxf,cxf-3.5.10,https://github.com/apache/cxf,GHSA-36wv-v2qp-v4g4,51ad92012fbcfbdd77b722214631303850315799,1c1d687f8e295f433a3592a3bc0b0a63c432bfde -136,jackrabbit_CVE-2025-53689_jackrabbit-2.23.1-beta,CVE-2025-53689,CWE-611,CWE-611: Improper Restriction of XML External Entity Reference,apache,jackrabbit,jackrabbit-2.23.1-beta,https://github.com/apache/jackrabbit,GHSA-44c3-38h8-9fh9,8b60b53546ebca4aa5160c9b764412fd381d5635,02786c0a01838580252bdab79bfa54026c30294e -137,tomcat_CVE-2025-53506_11.0.8,CVE-2025-53506,CWE-400,CWE-400: Uncontrolled Resource Consumption,apache,tomcat,11.0.8,https://github.com/apache/tomcat,GHSA-25xr-qj8w-c4vf,016c7e0c41d2282a31db5b6bdb362394a1bb0c99,2aa6261276ebe50b99276953591e3a2be7898bdb -138,tomcat_CVE-2025-52520_11.0.8,CVE-2025-52520,CWE-190,CWE-190: Integer Overflow or Wraparound,apache,tomcat,11.0.8,https://github.com/apache/tomcat,GHSA-wr62-c79q-cv37,434772930f362145516dd60681134e7f0cf8115b,927d66fbc294cb65242102b817a45fd80834e040 -139,junit-framework_CVE-2025-53103_r5.13.1,CVE-2025-53103,CWE-312,CWE-312: Cleartext Storage of Sensitive Information,junit-team,junit-framework,r5.13.1,https://github.com/junit-team/junit-framework,GHSA-m43g-m425-p68x,deb3e7c6487c370fc69703d19fbe559a9e4a97f7,d4fc834c8c1c0b3168cd030c13551d1d041f51bc -140,graylog2-server_CVE-2025-53106_6.2.3,CVE-2025-53106,CWE-285,CWE-285: Improper Authorization,Graylog2,graylog2-server,6.2.3,https://github.com/Graylog2/graylog2-server,GHSA-3m86-c9x3-vwm9,9c64a804c08200eee8ce2fdfd72bf541d4e1058c,6936bd16a783c2944a3d2f1e83902062520f90e3 -141,conductor_CVE-2025-26074_v3.21.12,CVE-2025-26074,CWE-78,CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'),conductor-oss,conductor,v3.21.12,https://github.com/conductor-oss/conductor,GHSA-8gqp-hr9g-pg62,5976cad67bab4204e3ec4b2edd6f6831623c7c9a,e9816501df1e364a3d39d7fe37d6e167c40eaa1b -142,jans_CVE-2025-53003_v1.7.0,CVE-2025-53003,CWE-200,CWE-200: Exposure of Sensitive Information to an Unauthorized Actor,JanssenProject,jans,v1.7.0,https://github.com/JanssenProject/jans,GHSA-373j-mhpf-84wg,c8b743763d6177fead693f916d0c14b42612daa9,92eea4d4637f1cae16ad2f07b2c16378ff3fc5f1 -143,incubator-seata_CVE-2025-32897_v2.2.0,CVE-2025-32897,CWE-502,CWE-502: Deserialization of Untrusted Data,apache,incubator-seata,v2.2.0,https://github.com/apache/incubator-seata,GHSA-m964-fjrh-xxq2,c95bd08bf1c139bbac323a0e2190cb6bbca2dba3,7eda23e948312ed52c3336de70a11f4d2ab06a48 -144,allure2_CVE-2025-52888_2.34.0,CVE-2025-52888,CWE-611,CWE-611: Improper Restriction of XML External Entity Reference,allure-framework,allure2,2.34.0,https://github.com/allure-framework/allure2,GHSA-h7qf-qmf3-85qg,eaa87ff7d93e79074f7a1d785740bd3fed2f89fd,cbcb33719851ff70adce85d38e15d20fc58d4eb7 -145,quarkus_CVE-2025-49574_3.23.4,CVE-2025-49574,CWE-668,CWE-668: Exposure of Resource to Wrong Sphere,quarkusio,quarkus,3.23.4,https://github.com/quarkusio/quarkus,GHSA-9623-mj7j-p9v4,fa4bc4dec34dffa7f02b75ad87b15a5d419f56df,2b58f59f4bf0bae7d35b1abb585b65f2a66787d1 -146,studio_CVE-2025-6384_v4.2.2,CVE-2025-6384,CWE-913,CWE-913: Improper Control of Dynamically-Managed Code Resources,craftercms,studio,v4.2.2,https://github.com/craftercms/studio,GHSA-5644-3vgq-2ph5,fddd637144f3b11bd22aafda5f9a5880719af4fe,471bbad07cf1f3b420529a020c1409ad57d48a4e -147,powsybl-core_CVE-2025-48059_v6.2.4,CVE-2025-48059,CWE-1333,CWE-1333: Inefficient Regular Expression Complexity,powsybl,powsybl-core,v6.2.4,https://github.com/powsybl/powsybl-core,GHSA-8qjw-9xgm-c9ff,e6c7c4997ae8758b54a2f23ce1a499e25113acdc,d8398f689a5ccd505bd62eee2bd6670a29133110 -148,powsybl-core_CVE-2025-48058_v6.7.1,CVE-2025-48058,CWE-1333,CWE-1333: Inefficient Regular Expression Complexity,powsybl,powsybl-core,v6.7.1,https://github.com/powsybl/powsybl-core,GHSA-rqpx-f6rc-7hm5,d6525f9e164338829058dfce187f0ff8af1f2790,72f79dec6d4292f892fbddd68a19c67935c7d81f -149,powsybl-core_CVE-2025-47771_v6.7.1,CVE-2025-47771,CWE-502,CWE-502: Deserialization of Untrusted Data,powsybl,powsybl-core,v6.7.1,https://github.com/powsybl/powsybl-core,GHSA-f5cx-h789-j959,d8398f689a5ccd505bd62eee2bd6670a29133110,8ed16ce41683c4aef5f6aa1dd5ae8642aa5ed2bd -150,powsybl-core_CVE-2025-47293_v6.7.1,CVE-2025-47293,CWE-611,CWE-611: Improper Restriction of XML External Entity Reference,powsybl,powsybl-core,v6.7.1,https://github.com/powsybl/powsybl-core,GHSA-qpj9-qcwx-8jv2,72f79dec6d4292f892fbddd68a19c67935c7d81f,e6c7c4997ae8758b54a2f23ce1a499e25113acdc -151,tomcat_CVE-2025-49125_11.0.7,CVE-2025-49125,CWE-288,CWE-288: Authentication Bypass Using an Alternate Path or Channel,apache,tomcat,11.0.7,https://github.com/apache/tomcat,GHSA-wc4r-xq3c-5cf3,e0e07812224d327a321babb554f5a5758d30cc49,7617b9c247bc77ed0444dd69adcd8aa48777886c -152,tomcat_CVE-2025-48988_11.0.7,CVE-2025-48988,CWE-770,CWE-770: Allocation of Resources Without Limits or Throttling,apache,tomcat,11.0.7,https://github.com/apache/tomcat,GHSA-h3gc-qfqq-6h8f,10c4c2c7bbbe2191b4eef3fad68d30cf89920201,2b0ab14fb55d4edc896e5f1817f2ab76f714ae5e -153,commons-fileupload_CVE-2025-48976_commons-fileupload-1.5-RC1,CVE-2025-48976,CWE-770,CWE-770: Allocation of Resources Without Limits or Throttling,apache,commons-fileupload,commons-fileupload-1.5-RC1,https://github.com/apache/commons-fileupload,GHSA-vv7r-c36w-3prj,24e6cadd3dabf63d9093b277284453c551a01dec,bf68f63cfb312ef4710fb3dfb4d8e4e1665f4497 -154,solon_CVE-2025-46096_v3.1.2,CVE-2025-46096,CWE-22,CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),opensolon,solon,v3.1.2,https://github.com/opensolon/solon,GHSA-m63q-4hr8-5r5h,4fdbc8f37e3e752d4b267b486116399597ea56b4,49a3bf95fdcf050829843004b65a2b336ca6ddff -155,spring-framework_CVE-2025-41234_v6.2.7,CVE-2025-41234,CWE-113,CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting'),spring-projects,spring-framework,v6.2.7,https://github.com/spring-projects/spring-framework,GHSA-6r3c-xf4w-jxjm,e86dc9ad95204e71f93e1338cb7ccf379e3fbd70,f0e7b42704e6b33958f242d91bd690d6ef7ada9c -156,geoserver_CVE-2025-30145_2.26.2,CVE-2025-30145,CWE-835,CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop'),geoserver,geoserver,2.26.2,https://github.com/geoserver/geoserver,GHSA-gr67-pwcv-76gf,, -157,geoserver_CVE-2025-27505_2.26.2,CVE-2025-27505,CWE-862,CWE-862: Missing Authorization,geoserver,geoserver,2.26.2,https://github.com/geoserver/geoserver,GHSA-h86g-x8mm-78m5,, -158,para_CVE-2025-49009_v1.50.7,CVE-2025-49009,CWE-532,CWE-532: Insertion of Sensitive Information into Log File,Erudika,para,v1.50.7,https://github.com/Erudika/para,GHSA-qx7g-fx8q-545g,d0ef6f9a749178049bb232de99a4c187c0dc4173,46a908d887da02037384193f70a69345f04887cf -159,inlong_CVE-2025-27531_2.0.0-RC0,CVE-2025-27531,CWE-502,CWE-502: Deserialization of Untrusted Data,apache,inlong,2.0.0-RC0,https://github.com/apache/inlong,GHSA-62gc-8jr5-x9pm,1183e43b442558139169ab981a7d35c60860d859,ebcd6d3230b73abdc41edb93619be2a26c9b8c97 -160,akka-management_CVE-2025-46548_v1.6.0-M1,CVE-2025-46548,CWE-287,CWE-287: Improper Authentication,akka,akka-management,v1.6.0-M1,https://github.com/akka/akka-management,GHSA-9qvj-rpj8-v5c8,, -161,para_CVE-2025-48955_v1.50.7,CVE-2025-48955,CWE-532,CWE-532: Insertion of Sensitive Information into Log File,Erudika,para,v1.50.7,https://github.com/Erudika/para,GHSA-v75g-77vf-6jjq,a48d3dff85e6d36402c2f6eea14f371acfcdbbf7,1e8a89558542854bb0683ab234c4429ad93b0835 -162,commons-beanutils_CVE-2025-48734_commons-beanutils-1.10.1-RC1,CVE-2025-48734,CWE-284,CWE-284: Improper Access Control,apache,commons-beanutils,commons-beanutils-1.10.1-RC1,https://github.com/apache/commons-beanutils,GHSA-wxr5-93ph-8wr9,4d8492104cdd00c0801af812d5cde643fcf7e1db,bd20740da25b69552ddef8523beec0837297eaf9 -163,valtimo-backend-libraries_CVE-2025-48881_12.12.0.RELEASE,CVE-2025-48881,CWE-863,CWE-863: Incorrect Authorization,valtimo-platform,valtimo-backend-libraries,12.12.0.RELEASE,https://github.com/valtimo-platform/valtimo-backend-libraries,GHSA-965r-9cg9-g42p,33779f203273a6b02007217965d97d5036178d8e,6ab04b30d3dab816bfea32d40ba50e5dd4517272 -164,inlong_CVE-2025-27526_2.1.0-RC0,CVE-2025-27526,CWE-502,CWE-502: Deserialization of Untrusted Data,apache,inlong,2.1.0-RC0,https://github.com/apache/inlong,GHSA-532x-j9r7-8f73,9d36b2338c1b7b3f151582eb447d9b6af2abbfe7,48c2f5cad4a92be2c3561174d70cdbc91a2d2626 -165,inlong_CVE-2025-27528_2.1.0-RC0,CVE-2025-27528,CWE-502,CWE-502: Deserialization of Untrusted Data,apache,inlong,2.1.0-RC0,https://github.com/apache/inlong,GHSA-98v7-xxxv-hcrh,9d36b2338c1b7b3f151582eb447d9b6af2abbfe7,48c2f5cad4a92be2c3561174d70cdbc91a2d2626 -166,inlong_CVE-2025-27522_2.1.0-RC0,CVE-2025-27522,CWE-502,CWE-502: Deserialization of Untrusted Data,apache,inlong,2.1.0-RC0,https://github.com/apache/inlong,GHSA-r324-vgr5-73c9,b37f944f2308c1c8c34bb4aa088d87153d7a4598,86c893cfd8f7ba9ffce5d20abef6cd360f502fdf -167,spring-framework_CVE-2025-22233_v6.2.6,CVE-2025-22233,CWE-20,CWE-20: Improper Input Validation,spring-projects,spring-framework,v6.2.6,https://github.com/spring-projects/spring-framework,GHSA-4wp7-92pw-q264,f93132b11ef6aa5718d20a05846828659c082fe8,edfcc6ffb188e4614ec9b212e3208b666981851c -168,cloudbees-jenkins-advisor-plugin_CVE-2025-47885_374.v194b_d4f0c8c8,CVE-2025-47885,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),jenkinsci,cloudbees-jenkins-advisor-plugin,374.v194b_d4f0c8c8,https://github.com/jenkinsci/cloudbees-jenkins-advisor-plugin,GHSA-xrpq-4g9w-qrwj,4a0914b416ad664bb3b9b07505d0d657b0d32d31,4b456b3110d1504d7dce8e7fca84c4e8793650e6 -169,webdrivermanager_CVE-2025-4641_webdrivermanager-6.0.1,CVE-2025-4641,CWE-611,CWE-611: Improper Restriction of XML External Entity Reference,bonigarcia,webdrivermanager,webdrivermanager-6.0.1,https://github.com/bonigarcia/webdrivermanager,GHSA-pwm3-776c-8q7q,81f1c18de7dec8bacdfe011e8fb9d18492f59257,32b0b4d9c21adf474be9b63530b073b85ffbb65b -170,iotdb_CVE-2025-26795_v1.3.3,CVE-2025-26795,CWE-200,CWE-200: Exposure of Sensitive Information to an Unauthorized Actor,apache,iotdb,v1.3.3,https://github.com/apache/iotdb,GHSA-gp98-hfvm-2r4x,946fcbc2d3b3a773e23fff3ccc9b4d5e3247f9f2,34fcaff6b72470d5ad369307dde7fae8897aea7e -171,iotdb_CVE-2025-26864_v1.3.3,CVE-2025-26864,CWE-200,CWE-200: Exposure of Sensitive Information to an Unauthorized Actor,apache,iotdb,v1.3.3,https://github.com/apache/iotdb,GHSA-5fc3-pqf2-57cx,946fcbc2d3b3a773e23fff3ccc9b4d5e3247f9f2,34fcaff6b72470d5ad369307dde7fae8897aea7e -172,jetty.project_CVE-2025-1948_jetty-12.0.16,CVE-2025-1948,CWE-400,CWE-400: Uncontrolled Resource Consumption,jetty,jetty.project,jetty-12.0.16,https://github.com/jetty/jetty.project,GHSA-889j-63jv-qhr8,8414f79a9c476ecb78998c8ce88f0c5ae548f7e6,c8c2515936ef968dc8a3cecd9e79d1e69291e4bb -173,console_CVE-2025-2901_v3.7.10,CVE-2025-2901,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),hal,console,v3.7.10,https://github.com/hal/console,GHSA-f7jh-m6wp-jm7f,d9112153b83df2977df41795b0676267fa37a1f0,216de3b8aa82ea92df10cc296d88c68467cf2c52 -174,keycloak_CVE-2025-3910_26.2.1,CVE-2025-3910,CWE-287,CWE-287: Improper Authentication,keycloak,keycloak,26.2.1,https://github.com/keycloak/keycloak,GHSA-5jfq-x6xp-7rw2,0ff4cce3180d6441b5dfaa269a33cb3cab15dd5e,e66e2292b9068d712f316044f62f51690e77c7c6 -175,keycloak_CVE-2025-3501_26.2.1,CVE-2025-3501,CWE-297,CWE-297: Improper Validation of Certificate with Host Mismatch,keycloak,keycloak,26.2.1,https://github.com/keycloak/keycloak,GHSA-hw58-3793-42gg,a78c951a5aeb820d01d2987397e24b3362c455f0,99ca24c832729075e04d8bc58666089268314272 -176,syntax-markdown_CVE-2025-46558_syntax-markdown-8.8,CVE-2025-46558,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),xwiki-contrib,syntax-markdown,syntax-markdown-8.8,https://github.com/xwiki-contrib/syntax-markdown,GHSA-8g2j-rhfh-hq3r,6b32e97760b9f8b9c9e751e0ccfb989f57ffc07b,d136472d6e8a47981a0ede420a9096f88ffa5035 -177,jpawebapi_CVE-2025-32961_v1.1.0,CVE-2025-32961,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),cuba-platform,jpawebapi,v1.1.0,https://github.com/cuba-platform/jpawebapi,GHSA-hg25-w3vg-7279,14fa1acacc2401f75a639fe33e71961460b97505,78b837d7e2b12d0df69cef1bc6042ebf3bdaf22c -178,restapi_CVE-2025-32960_v7.2.6,CVE-2025-32960,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),cuba-platform,restapi,v7.2.6,https://github.com/cuba-platform/restapi,GHSA-88h5-34xw-2q56,f0f76a8fa8f087e98ac715430a7f142965c9282a,b3d599f6657d7e212fdb134a61ab5e0888669eb1 -179,cuba_CVE-2025-32959_7.2.22,CVE-2025-32959,CWE-770,CWE-770: Allocation of Resources Without Limits or Throttling,cuba-platform,cuba,7.2.22,https://github.com/cuba-platform/cuba,GHSA-w3mp-6vrj-875g,9ab5f77c5886712d3c29aeacaf9309f9dc543f65,42b6c00fd0572b8e52ae31afd1babc827a3161a1 -180,templating-engine-plugin_CVE-2025-31722_2.5.3,CVE-2025-31722,CWE-94,CWE-94: Improper Control of Generation of Code ('Code Injection'),jenkinsci,templating-engine-plugin,2.5.3,https://github.com/jenkinsci/templating-engine-plugin,GHSA-4vjp-327p-w4qv,0af836f6465f80a078a02c6f2ed2e93dd5056213,bb2b4468b3bf4cea494afb8549af4e6450972653 -181,jenkins_CVE-2025-31721_prototype-1.7,CVE-2025-31721,CWE-862,CWE-862: Missing Authorization,jenkinsci,jenkins,prototype-1.7,https://github.com/jenkinsci/jenkins,GHSA-wr6w-jxg7-qpfh,bf32018bf075c06e5df649583557c82d42d8bb5c,b3651b475302e8dba20fc63c1ff89d144ec652f0 -182,jenkins_CVE-2025-31720_prototype-1.7,CVE-2025-31720,CWE-862,CWE-862: Missing Authorization,jenkinsci,jenkins,prototype-1.7,https://github.com/jenkinsci/jenkins,GHSA-565r-pf5q-45v6,dddb4598df25527220a1e0f46d1a0d25217dd4c8,bf32018bf075c06e5df649583557c82d42d8bb5c -183,simple-queue-plugin_CVE-2025-31723_simple-queue-1.4.6,CVE-2025-31723,CWE-352,CWE-352: Cross-Site Request Forgery (CSRF),jenkinsci,simple-queue-plugin,simple-queue-1.4.6,https://github.com/jenkinsci/simple-queue-plugin,GHSA-hcfh-qjcp-34q9,c5bc23d6ddd16b0a9792dd05e843a14033e975f1,c1094666dcd139830620d6d1c21b13f847601e74 -184,camel_CVE-2025-30177_camel-4.10.2,CVE-2025-30177,CWE-164,CWE-164: Improper Neutralization of Internal Special Elements,apache,camel,camel-4.10.2,https://github.com/apache/camel,GHSA-vq4p-pchp-6g6v,4ccb68b166c0d1210966f17d18b848cdd8b64fed,9fd8fc30dbd98511a1faa0cbcf39ef5aeec88a64 -185,activemq-artemis_CVE-2025-27427_2.39.0,CVE-2025-27427,CWE-863,CWE-863: Incorrect Authorization,apache,activemq-artemis,2.39.0,https://github.com/apache/activemq-artemis,GHSA-3w85-5p9g-h334,c5bfb32ed2b71c0510d9df373c8e6a7f75ea89f4,2216a75a57f098295abb283d556c8b8bda91324d -186,netty-incubator-codec-quic_CVE-2025-29908_netty-incubator-codec-parent-quic-0.0.70.Final,CVE-2025-29908,CWE-407,CWE-407: Inefficient Algorithmic Complexity,netty,netty-incubator-codec-quic,netty-incubator-codec-parent-quic-0.0.70.Final,https://github.com/netty/netty-incubator-codec-quic,GHSA-hqqc-jr88-p6x2,dca355aa8a1f63dfaf6aa2fe88734e4bd5314c14,e059bd9b78723f8b035e0c547e42ce263f03461c -187,kylin_CVE-2025-30067_kylin-5.0.1,CVE-2025-30067,CWE-94,CWE-94: Improper Control of Generation of Code ('Code Injection'),apache,kylin,kylin-5.0.1,https://github.com/apache/kylin,GHSA-29m8-wh9p-5wc4,bd86f44d597640d64e4a5789a54c1a3f2aa7786d,21d98f3ef29f71b50dacabbf039905f9f0f71b95 -188,spring-security_CVE-2025-22223_6.4.3,CVE-2025-22223,CWE-290,CWE-290: Authentication Bypass by Spoofing,spring-projects,spring-security,6.4.3,https://github.com/spring-projects/spring-security,GHSA-hh3m-g4qj-4835,4993fa863a02008b606044cb897db6b54ec116f0,dc2e1af2dab8ef81cd4edd25b56a2babeaab8cf9 -189,druid_CVE-2025-27888_druid-31.0.1-rc2,CVE-2025-27888,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),apache,druid,druid-31.0.1-rc2,https://github.com/apache/druid,GHSA-2xcr-p767-f3rv,, -190,spring-security_CVE-2025-22228_6.3.7,CVE-2025-22228,CWE-287,CWE-287: Improper Authentication,spring-projects,spring-security,6.3.7,https://github.com/spring-projects/spring-security,GHSA-mg83-c7gq-rv5c,36ea1b11a7dae7904e3c70b5e10fb01152fec5d4,46f0dc6dfc8402cd556c598fdf2d31f9d46cdbf3 -191,zohoqengine-plugin_CVE-2025-30197_1.0.29.vfa_cc23396502,CVE-2025-30197,CWE-522,CWE-522: Insufficiently Protected Credentials,jenkinsci,zohoqengine-plugin,1.0.29.vfa_cc23396502,https://github.com/jenkinsci/zohoqengine-plugin,GHSA-2x3g-rr4w-4qrp,facc233965029a025b136efe0aa43b68cf522298,4ab1db6d6af21f43dd15cc328599445519875fa8 -192,snowflake-jdbc_CVE-2025-27496_v3.23.0,CVE-2025-27496,CWE-532,CWE-532: Insertion of Sensitive Information into Log File,snowflakedb,snowflake-jdbc,v3.23.0,https://github.com/snowflakedb/snowflake-jdbc,GHSA-q298-375f-5q63,f8ab78a9567fcc3d3b245ba5a993110df9e3c6d8,ef81582ce2f1dbc3c8794a696c94f4fe65fad507 -193,smallrye-fault-tolerance_CVE-2025-2240_6.4.1,CVE-2025-2240,CWE-1325,CWE-1325: Improperly Controlled Sequential Memory Allocation,smallrye,smallrye-fault-tolerance,6.4.1,https://github.com/smallrye/smallrye-fault-tolerance,GHSA-gfh6-3pqw-x2j4,8da7dae36f195608291687793ca9f12fd9567d93,e8bcad3d5e8bbac0a3219bd5c13661adf6ed6bbb -194,keycloak_CVE-2025-1391_26.1.2,CVE-2025-1391,CWE-284,CWE-284: Improper Access Control,keycloak,keycloak,26.1.2,https://github.com/keycloak/keycloak,GHSA-gvgg-2r3r-53x7,4b628610c42b7754d0b3f4a0283202a5dcaa9697,5aa2b4c75bb474303ab807017582bc01a9f7e378 -195,keycloak_CVE-2025-0604_26.1.2,CVE-2025-0604,CWE-287,CWE-287: Improper Authentication,keycloak,keycloak,26.1.2,https://github.com/keycloak/keycloak,GHSA-2p82-5wwr-43cw,b70303f2932dabd5f462128b1dc8a3d2640799a2,d3c50822441845cb7aeeef8cc444f09686fc6d35 -196,tomcat_CVE-2025-24813_11.0.2,CVE-2025-24813,CWE-44,CWE-44: Path Equivalence: 'file.name' (Internal Dot),apache,tomcat,11.0.2,https://github.com/apache/tomcat,GHSA-83qj-6fr2-vhqg,7d50e72fa00ad6eeab6e64ec9d34b7cc606e5a96,0a668e0c27f2b7ca0cc7c6eea32253b9b5ecb29c -197,local-s3_CVE-2025-27136_1.20,CVE-2025-27136,CWE-611,CWE-611: Improper Restriction of XML External Entity Reference,Robothy,local-s3,1.2,https://github.com/Robothy/local-s3,GHSA-g6wm-2v64-wq36,009901882be8b543e85b67c5ec2e9f30d83d62ef,d6ed756ceb30c1eb9d4263321ac683d734f8836f -198,emissary_CVE-2025-27508_8.23.0,CVE-2025-27508,CWE-327,CWE-327: Use of a Broken or Risky Cryptographic Algorithm,NationalSecurityAgency,emissary,8.23.0,https://github.com/NationalSecurityAgency/emissary,GHSA-hw43-fcmm-3m5g,ff9fed1d5910ca1879a290b78045ec991a93cb2e,da3a81a8977577597ff2a944820a5ae4e9762368 -199,OpenDJ_CVE-2025-27497_4.9.2,CVE-2025-27497,CWE-835,CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop'),OpenIdentityPlatform,OpenDJ,4.9.2,https://github.com/OpenIdentityPlatform/OpenDJ,GHSA-93qr-h8pr-4593,688a9ffc80d3c6c21c9cf1b89b1a6d8ed7d0cc1d,08aee4724608e4a32baa3c7d7499ec913a275aaf -200,solon_CVE-2025-1584_v3.0.8,CVE-2025-1584,CWE-23,CWE-23: Relative Path Traversal,opensolon,solon,v3.0.8,https://github.com/opensolon/solon,GHSA-x8q6-cchr-p7m6,87474726f1e496b381ce9d5ebbadabd0e04c2d75,f46e47fd1f8455b9467d7ead3cdb0509115b2ef1 -201,cassandra-lucene-index_CVE-2025-26511_cassandra-4.0.16-1.0.0,CVE-2025-26511,CWE-288,CWE-288: Authentication Bypass Using an Alternate Path or Channel,instaclustr,cassandra-lucene-index,cassandra-4.0.16-1.0.0,https://github.com/instaclustr/cassandra-lucene-index,GHSA-mrqp-q7vx-v2cx,75b83c55705e38a4e93fbeb3d841779810074924,94380b165bd3e597d3e22e47f8cc674ec7c7bf7f -202,netty_CVE-2025-25193_netty-4.1.117.Final,CVE-2025-25193,CWE-400,CWE-400: Uncontrolled Resource Consumption,netty,netty,netty-4.1.117.Final,https://github.com/netty/netty,GHSA-389x-839f-4rhx,f844d78e4e23182610a24576d225de933f90f92e,d1fbda62d3a47835d3fb35db8bd42ecc205a5386 -203,netty_CVE-2025-24970_netty-4.1.117.Final,CVE-2025-24970,CWE-20,CWE-20: Improper Input Validation,netty,netty,netty-4.1.117.Final,https://github.com/netty/netty,GHSA-4g8c-wm8x-jfhw,d1fbda62d3a47835d3fb35db8bd42ecc205a5386,87f40725155b2f89adfde68c7732f97c153676c4 -204,felix-dev_CVE-2025-25247_org.osgi.compendium-1.4.0,CVE-2025-25247,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),apache,felix-dev,org.osgi.compendium-1.4.0,https://github.com/apache/felix-dev,GHSA-4c37-7m5h-c8m9,c9df37190eddd3a8af4262956436880a3acb8c90,87513ea3533fdb79d9e2b251410bf2bfbd63941e -205,cassandra_CVE-2025-23015_cassandra-5.0-alpha2,CVE-2025-23015,CWE-267,CWE-267: Privilege Defined With Unsafe Actions,apache,cassandra,cassandra-5.0-alpha2,https://github.com/apache/cassandra,GHSA-wmcc-9vch-jmx4,3ddccf45213f69ac282690186484ae7b9c0151ba,6207a305ba2b0cebc3241e00a843ab5dbf86d2ed -206,s3proxy_CVE-2025-24961_s3proxy-2.5.0,CVE-2025-24961,CWE-22,CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),gaul,s3proxy,s3proxy-2.5.0,https://github.com/gaul/s3proxy,GHSA-2ccp-vqmv-4r4x,,b0819e0ef5e08c792a4d1724b938714ce9503aa3 -207,wildfly-core_CVE-2025-23367_27.0.0.Beta7,CVE-2025-23367,CWE-284,CWE-284: Improper Access Control,wildfly,wildfly-core,27.0.0.Beta7,https://github.com/wildfly/wildfly-core,GHSA-qr6x-62gq-4ccp,, -208,djl_CVE-2025-0851_v0.30.0,CVE-2025-0851,CWE-22,CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),deepjavalibrary,djl,v0.30.0,https://github.com/deepjavalibrary/djl,GHSA-jcrp-x7w3-ffmg,503289a69c581e2373e12cff78ea2adc03a8d86f,7415cc5f72aae69ea9716a5e4f709af03a77a619 -209,snowflake-jdbc_CVE-2025-24790_v3.21.1,CVE-2025-24790,CWE-276,CWE-276: Incorrect Default Permissions,snowflakedb,snowflake-jdbc,v3.21.1,https://github.com/snowflakedb/snowflake-jdbc,GHSA-33g6-495w-v8j2,3236d9840c61cdffa7093c631539523b9d1d6836,9e1a5acf12406b16c4780ca013f4c4db48b74b59 -210,snowflake-jdbc_CVE-2025-24789_v3.21.1,CVE-2025-24789,CWE-426,CWE-426: Untrusted Search Path,snowflakedb,snowflake-jdbc,v3.21.1,https://github.com/snowflakedb/snowflake-jdbc,GHSA-7hpq-3g6w-pvhf,9e1a5acf12406b16c4780ca013f4c4db48b74b59,4f01bb8f9b708c71e7a2111c87371dbfc1d53dd6 -211,oic-auth-plugin_CVE-2025-24399_4.452.v2849b_d3945fa_,CVE-2025-24399,CWE-178,CWE-178: Improper Handling of Case Sensitivity,jenkinsci,oic-auth-plugin,4.452.v2849b_d3945fa_,https://github.com/jenkinsci/oic-auth-plugin,GHSA-q9cm-88jx-3vfw,2849bd3945fa4c66fbc89da161d481565f85cdec,4d7765c854f4f5e6e3c26ed950a26042a7527875 -212,cxf_CVE-2025-23184_cxf-3.5.9,CVE-2025-23184,CWE-400,CWE-400: Uncontrolled Resource Consumption,apache,cxf,cxf-3.5.9,https://github.com/apache/cxf,GHSA-fh5r-crhr-qrrq,, -213,jte_CVE-2025-23026_3.1.15,CVE-2025-23026,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),casid,jte,3.1.15,https://github.com/casid/jte,GHSA-vh22-6c6h-rm8q,0c7d4ad7a135d169b2db85062d827279e6d86aaf,a6fb00d53c7b8dbb86de933215dbe1b9191a57f1 \ No newline at end of file +128,keycloak__CVE-2025-7784_26.2.5,CVE-2025-7784,CWE-269,CWE-269: Improper Privilege Management,keycloak,keycloak,26.2.5,https://github.com/keycloak/keycloak,GHSA-27gp-8389-hm4w,, +129,keycloak__CVE-2025-7365_26.0.12,CVE-2025-7365,CWE-346,CWE-346: Origin Validation Error,keycloak,keycloak,26.0.12,https://github.com/keycloak/keycloak,GHSA-xhpr-465j-7p9q,1183157d862f9ccc66e1d6b36018e1aea6d49046,86f0a7864f2bdd991d5e24e6844ddabfce0aa6de +130,opencast__CVE-2025-54380_17.5,CVE-2025-54380,CWE-200,CWE-200: Exposure of Sensitive Information to an Unauthorized Actor,opencast,opencast,17.5,https://github.com/opencast/opencast,GHSA-j63h-hmgw-x4j7,9bda49b6021f665c78a950c589b1a31198e2df49,2d3219113e2b9fadfb06443f5468b1c2157827a6 +131,jena__CVE-2025-49656_jena-5.4.0,CVE-2025-49656,CWE-22,CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),apache,jena,jena-5.4.0,https://github.com/apache/jena,GHSA-jq2c-m8gg-mqcm,35350569b4c1fd432d92e7c92af9597c4400debe,03c5265910aa3a27907bf54f6b4aaae3409afa4f +132,reactor-netty__CVE-2025-22227_v1.2.8,CVE-2025-22227,CWE-200,CWE-200: Exposure of Sensitive Information to an Unauthorized Actor,reactor,reactor-netty,v1.2.8,https://github.com/reactor/reactor-netty,GHSA-4q2v-9p7v-3v22,a60f640c99d13af4e685c368a810c47b7f9fc628,522892307ea89bf24fe634e8bfea35728c9bf411 +133,DSpace__CVE-2025-53622_dspace-7.6.3,CVE-2025-53622,CWE-22,CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),DSpace,DSpace,dspace-7.6.3,https://github.com/DSpace/DSpace,GHSA-vhvx-8xgc-99wf,4da8ed69f44786dc33a3dd9a62ee719a51a4830e,3163ff8b1ea0abe09683a1a94fb5f5bb039983b3 +134,DSpace__CVE-2025-53621_dspace-7.6.3,CVE-2025-53621,CWE-611,CWE-611: Improper Restriction of XML External Entity Reference,DSpace,DSpace,dspace-7.6.3,https://github.com/DSpace/DSpace,GHSA-jjwr-5cfh-7xwh,24357bdd9cf3bd05e4336d0c2d8a0cc7a2932417,28b5f3810fa2b819516e706849a99a9bf5f3de87 +135,cxf__CVE-2025-48795_cxf-3.5.10,CVE-2025-48795,CWE-400,CWE-400: Uncontrolled Resource Consumption,apache,cxf,cxf-3.5.10,https://github.com/apache/cxf,GHSA-36wv-v2qp-v4g4,51ad92012fbcfbdd77b722214631303850315799,1c1d687f8e295f433a3592a3bc0b0a63c432bfde +136,jackrabbit__CVE-2025-53689_jackrabbit-2.23.1-beta,CVE-2025-53689,CWE-611,CWE-611: Improper Restriction of XML External Entity Reference,apache,jackrabbit,jackrabbit-2.23.1-beta,https://github.com/apache/jackrabbit,GHSA-44c3-38h8-9fh9,8b60b53546ebca4aa5160c9b764412fd381d5635,02786c0a01838580252bdab79bfa54026c30294e +137,tomcat__CVE-2025-53506_11.0.8,CVE-2025-53506,CWE-400,CWE-400: Uncontrolled Resource Consumption,apache,tomcat,11.0.8,https://github.com/apache/tomcat,GHSA-25xr-qj8w-c4vf,016c7e0c41d2282a31db5b6bdb362394a1bb0c99,2aa6261276ebe50b99276953591e3a2be7898bdb +138,tomcat__CVE-2025-52520_11.0.8,CVE-2025-52520,CWE-190,CWE-190: Integer Overflow or Wraparound,apache,tomcat,11.0.8,https://github.com/apache/tomcat,GHSA-wr62-c79q-cv37,434772930f362145516dd60681134e7f0cf8115b,927d66fbc294cb65242102b817a45fd80834e040 +139,junit-framework__CVE-2025-53103_r5.13.1,CVE-2025-53103,CWE-312,CWE-312: Cleartext Storage of Sensitive Information,junit-team,junit-framework,r5.13.1,https://github.com/junit-team/junit-framework,GHSA-m43g-m425-p68x,deb3e7c6487c370fc69703d19fbe559a9e4a97f7,d4fc834c8c1c0b3168cd030c13551d1d041f51bc +140,graylog2-server__CVE-2025-53106_6.2.3,CVE-2025-53106,CWE-285,CWE-285: Improper Authorization,Graylog2,graylog2-server,6.2.3,https://github.com/Graylog2/graylog2-server,GHSA-3m86-c9x3-vwm9,9c64a804c08200eee8ce2fdfd72bf541d4e1058c,6936bd16a783c2944a3d2f1e83902062520f90e3 +141,conductor__CVE-2025-26074_v3.21.12,CVE-2025-26074,CWE-78,CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'),conductor-oss,conductor,v3.21.12,https://github.com/conductor-oss/conductor,GHSA-8gqp-hr9g-pg62,5976cad67bab4204e3ec4b2edd6f6831623c7c9a,e9816501df1e364a3d39d7fe37d6e167c40eaa1b +142,jans__CVE-2025-53003_v1.7.0,CVE-2025-53003,CWE-200,CWE-200: Exposure of Sensitive Information to an Unauthorized Actor,JanssenProject,jans,v1.7.0,https://github.com/JanssenProject/jans,GHSA-373j-mhpf-84wg,c8b743763d6177fead693f916d0c14b42612daa9,92eea4d4637f1cae16ad2f07b2c16378ff3fc5f1 +143,incubator-seata__CVE-2025-32897_v2.2.0,CVE-2025-32897,CWE-502,CWE-502: Deserialization of Untrusted Data,apache,incubator-seata,v2.2.0,https://github.com/apache/incubator-seata,GHSA-m964-fjrh-xxq2,c95bd08bf1c139bbac323a0e2190cb6bbca2dba3,7eda23e948312ed52c3336de70a11f4d2ab06a48 +144,allure2__CVE-2025-52888_2.34.0,CVE-2025-52888,CWE-611,CWE-611: Improper Restriction of XML External Entity Reference,allure-framework,allure2,2.34.0,https://github.com/allure-framework/allure2,GHSA-h7qf-qmf3-85qg,eaa87ff7d93e79074f7a1d785740bd3fed2f89fd,cbcb33719851ff70adce85d38e15d20fc58d4eb7 +145,quarkus__CVE-2025-49574_3.23.4,CVE-2025-49574,CWE-668,CWE-668: Exposure of Resource to Wrong Sphere,quarkusio,quarkus,3.23.4,https://github.com/quarkusio/quarkus,GHSA-9623-mj7j-p9v4,fa4bc4dec34dffa7f02b75ad87b15a5d419f56df,2b58f59f4bf0bae7d35b1abb585b65f2a66787d1 +146,studio__CVE-2025-6384_v4.2.2,CVE-2025-6384,CWE-913,CWE-913: Improper Control of Dynamically-Managed Code Resources,craftercms,studio,v4.2.2,https://github.com/craftercms/studio,GHSA-5644-3vgq-2ph5,fddd637144f3b11bd22aafda5f9a5880719af4fe,471bbad07cf1f3b420529a020c1409ad57d48a4e +147,powsybl-core__CVE-2025-48059_v6.2.4,CVE-2025-48059,CWE-1333,CWE-1333: Inefficient Regular Expression Complexity,powsybl,powsybl-core,v6.2.4,https://github.com/powsybl/powsybl-core,GHSA-8qjw-9xgm-c9ff,e6c7c4997ae8758b54a2f23ce1a499e25113acdc,d8398f689a5ccd505bd62eee2bd6670a29133110 +148,powsybl-core__CVE-2025-48058_v6.7.1,CVE-2025-48058,CWE-1333,CWE-1333: Inefficient Regular Expression Complexity,powsybl,powsybl-core,v6.7.1,https://github.com/powsybl/powsybl-core,GHSA-rqpx-f6rc-7hm5,d6525f9e164338829058dfce187f0ff8af1f2790,72f79dec6d4292f892fbddd68a19c67935c7d81f +149,powsybl-core__CVE-2025-47771_v6.7.1,CVE-2025-47771,CWE-502,CWE-502: Deserialization of Untrusted Data,powsybl,powsybl-core,v6.7.1,https://github.com/powsybl/powsybl-core,GHSA-f5cx-h789-j959,d8398f689a5ccd505bd62eee2bd6670a29133110,8ed16ce41683c4aef5f6aa1dd5ae8642aa5ed2bd +150,powsybl-core__CVE-2025-47293_v6.7.1,CVE-2025-47293,CWE-611,CWE-611: Improper Restriction of XML External Entity Reference,powsybl,powsybl-core,v6.7.1,https://github.com/powsybl/powsybl-core,GHSA-qpj9-qcwx-8jv2,72f79dec6d4292f892fbddd68a19c67935c7d81f,e6c7c4997ae8758b54a2f23ce1a499e25113acdc +151,tomcat__CVE-2025-49125_11.0.7,CVE-2025-49125,CWE-288,CWE-288: Authentication Bypass Using an Alternate Path or Channel,apache,tomcat,11.0.7,https://github.com/apache/tomcat,GHSA-wc4r-xq3c-5cf3,e0e07812224d327a321babb554f5a5758d30cc49,7617b9c247bc77ed0444dd69adcd8aa48777886c +152,tomcat__CVE-2025-48988_11.0.7,CVE-2025-48988,CWE-770,CWE-770: Allocation of Resources Without Limits or Throttling,apache,tomcat,11.0.7,https://github.com/apache/tomcat,GHSA-h3gc-qfqq-6h8f,10c4c2c7bbbe2191b4eef3fad68d30cf89920201,2b0ab14fb55d4edc896e5f1817f2ab76f714ae5e +153,commons-fileupload__CVE-2025-48976_commons-fileupload-1.5-RC1,CVE-2025-48976,CWE-770,CWE-770: Allocation of Resources Without Limits or Throttling,apache,commons-fileupload,commons-fileupload-1.5-RC1,https://github.com/apache/commons-fileupload,GHSA-vv7r-c36w-3prj,24e6cadd3dabf63d9093b277284453c551a01dec,bf68f63cfb312ef4710fb3dfb4d8e4e1665f4497 +154,solon__CVE-2025-46096_v3.1.2,CVE-2025-46096,CWE-22,CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),opensolon,solon,v3.1.2,https://github.com/opensolon/solon,GHSA-m63q-4hr8-5r5h,4fdbc8f37e3e752d4b267b486116399597ea56b4,49a3bf95fdcf050829843004b65a2b336ca6ddff +155,spring-framework__CVE-2025-41234_v6.2.7,CVE-2025-41234,CWE-113,CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting'),spring-projects,spring-framework,v6.2.7,https://github.com/spring-projects/spring-framework,GHSA-6r3c-xf4w-jxjm,e86dc9ad95204e71f93e1338cb7ccf379e3fbd70,f0e7b42704e6b33958f242d91bd690d6ef7ada9c +156,geoserver__CVE-2025-30145_2.26.2,CVE-2025-30145,CWE-835,CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop'),geoserver,geoserver,2.26.2,https://github.com/geoserver/geoserver,GHSA-gr67-pwcv-76gf,, +157,geoserver__CVE-2025-27505_2.26.2,CVE-2025-27505,CWE-862,CWE-862: Missing Authorization,geoserver,geoserver,2.26.2,https://github.com/geoserver/geoserver,GHSA-h86g-x8mm-78m5,, +158,para__CVE-2025-49009_v1.50.7,CVE-2025-49009,CWE-532,CWE-532: Insertion of Sensitive Information into Log File,Erudika,para,v1.50.7,https://github.com/Erudika/para,GHSA-qx7g-fx8q-545g,d0ef6f9a749178049bb232de99a4c187c0dc4173,46a908d887da02037384193f70a69345f04887cf +159,inlong__CVE-2025-27531_2.0.0-RC0,CVE-2025-27531,CWE-502,CWE-502: Deserialization of Untrusted Data,apache,inlong,2.0.0-RC0,https://github.com/apache/inlong,GHSA-62gc-8jr5-x9pm,1183e43b442558139169ab981a7d35c60860d859,ebcd6d3230b73abdc41edb93619be2a26c9b8c97 +160,akka-management__CVE-2025-46548_v1.6.0-M1,CVE-2025-46548,CWE-287,CWE-287: Improper Authentication,akka,akka-management,v1.6.0-M1,https://github.com/akka/akka-management,GHSA-9qvj-rpj8-v5c8,, +161,para__CVE-2025-48955_v1.50.7,CVE-2025-48955,CWE-532,CWE-532: Insertion of Sensitive Information into Log File,Erudika,para,v1.50.7,https://github.com/Erudika/para,GHSA-v75g-77vf-6jjq,a48d3dff85e6d36402c2f6eea14f371acfcdbbf7,1e8a89558542854bb0683ab234c4429ad93b0835 +162,commons-beanutils__CVE-2025-48734_commons-beanutils-1.10.1-RC1,CVE-2025-48734,CWE-284,CWE-284: Improper Access Control,apache,commons-beanutils,commons-beanutils-1.10.1-RC1,https://github.com/apache/commons-beanutils,GHSA-wxr5-93ph-8wr9,4d8492104cdd00c0801af812d5cde643fcf7e1db,bd20740da25b69552ddef8523beec0837297eaf9 +163,valtimo-backend-libraries__CVE-2025-48881_12.12.0.RELEASE,CVE-2025-48881,CWE-863,CWE-863: Incorrect Authorization,valtimo-platform,valtimo-backend-libraries,12.12.0.RELEASE,https://github.com/valtimo-platform/valtimo-backend-libraries,GHSA-965r-9cg9-g42p,33779f203273a6b02007217965d97d5036178d8e,6ab04b30d3dab816bfea32d40ba50e5dd4517272 +164,inlong__CVE-2025-27526_2.1.0-RC0,CVE-2025-27526,CWE-502,CWE-502: Deserialization of Untrusted Data,apache,inlong,2.1.0-RC0,https://github.com/apache/inlong,GHSA-532x-j9r7-8f73,9d36b2338c1b7b3f151582eb447d9b6af2abbfe7,48c2f5cad4a92be2c3561174d70cdbc91a2d2626 +165,inlong__CVE-2025-27528_2.1.0-RC0,CVE-2025-27528,CWE-502,CWE-502: Deserialization of Untrusted Data,apache,inlong,2.1.0-RC0,https://github.com/apache/inlong,GHSA-98v7-xxxv-hcrh,9d36b2338c1b7b3f151582eb447d9b6af2abbfe7,48c2f5cad4a92be2c3561174d70cdbc91a2d2626 +166,inlong__CVE-2025-27522_2.1.0-RC0,CVE-2025-27522,CWE-502,CWE-502: Deserialization of Untrusted Data,apache,inlong,2.1.0-RC0,https://github.com/apache/inlong,GHSA-r324-vgr5-73c9,b37f944f2308c1c8c34bb4aa088d87153d7a4598,86c893cfd8f7ba9ffce5d20abef6cd360f502fdf +167,spring-framework__CVE-2025-22233_v6.2.6,CVE-2025-22233,CWE-20,CWE-20: Improper Input Validation,spring-projects,spring-framework,v6.2.6,https://github.com/spring-projects/spring-framework,GHSA-4wp7-92pw-q264,f93132b11ef6aa5718d20a05846828659c082fe8,edfcc6ffb188e4614ec9b212e3208b666981851c +168,cloudbees-jenkins-advisor-plugin__CVE-2025-47885_374.v194b_d4f0c8c8,CVE-2025-47885,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),jenkinsci,cloudbees-jenkins-advisor-plugin,374.v194b_d4f0c8c8,https://github.com/jenkinsci/cloudbees-jenkins-advisor-plugin,GHSA-xrpq-4g9w-qrwj,4a0914b416ad664bb3b9b07505d0d657b0d32d31,4b456b3110d1504d7dce8e7fca84c4e8793650e6 +169,webdrivermanager__CVE-2025-4641_webdrivermanager-6.0.1,CVE-2025-4641,CWE-611,CWE-611: Improper Restriction of XML External Entity Reference,bonigarcia,webdrivermanager,webdrivermanager-6.0.1,https://github.com/bonigarcia/webdrivermanager,GHSA-pwm3-776c-8q7q,81f1c18de7dec8bacdfe011e8fb9d18492f59257,32b0b4d9c21adf474be9b63530b073b85ffbb65b +170,iotdb__CVE-2025-26795_v1.3.3,CVE-2025-26795,CWE-200,CWE-200: Exposure of Sensitive Information to an Unauthorized Actor,apache,iotdb,v1.3.3,https://github.com/apache/iotdb,GHSA-gp98-hfvm-2r4x,946fcbc2d3b3a773e23fff3ccc9b4d5e3247f9f2,34fcaff6b72470d5ad369307dde7fae8897aea7e +171,iotdb__CVE-2025-26864_v1.3.3,CVE-2025-26864,CWE-200,CWE-200: Exposure of Sensitive Information to an Unauthorized Actor,apache,iotdb,v1.3.3,https://github.com/apache/iotdb,GHSA-5fc3-pqf2-57cx,946fcbc2d3b3a773e23fff3ccc9b4d5e3247f9f2,34fcaff6b72470d5ad369307dde7fae8897aea7e +172,jetty.project__CVE-2025-1948_jetty-12.0.16,CVE-2025-1948,CWE-400,CWE-400: Uncontrolled Resource Consumption,jetty,jetty.project,jetty-12.0.16,https://github.com/jetty/jetty.project,GHSA-889j-63jv-qhr8,8414f79a9c476ecb78998c8ce88f0c5ae548f7e6,c8c2515936ef968dc8a3cecd9e79d1e69291e4bb +173,console__CVE-2025-2901_v3.7.10,CVE-2025-2901,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),hal,console,v3.7.10,https://github.com/hal/console,GHSA-f7jh-m6wp-jm7f,d9112153b83df2977df41795b0676267fa37a1f0,216de3b8aa82ea92df10cc296d88c68467cf2c52 +174,keycloak__CVE-2025-3910_26.2.1,CVE-2025-3910,CWE-287,CWE-287: Improper Authentication,keycloak,keycloak,26.2.1,https://github.com/keycloak/keycloak,GHSA-5jfq-x6xp-7rw2,0ff4cce3180d6441b5dfaa269a33cb3cab15dd5e,e66e2292b9068d712f316044f62f51690e77c7c6 +175,keycloak__CVE-2025-3501_26.2.1,CVE-2025-3501,CWE-297,CWE-297: Improper Validation of Certificate with Host Mismatch,keycloak,keycloak,26.2.1,https://github.com/keycloak/keycloak,GHSA-hw58-3793-42gg,a78c951a5aeb820d01d2987397e24b3362c455f0,99ca24c832729075e04d8bc58666089268314272 +176,syntax-markdown__CVE-2025-46558_syntax-markdown-8.8,CVE-2025-46558,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),xwiki-contrib,syntax-markdown,syntax-markdown-8.8,https://github.com/xwiki-contrib/syntax-markdown,GHSA-8g2j-rhfh-hq3r,6b32e97760b9f8b9c9e751e0ccfb989f57ffc07b,d136472d6e8a47981a0ede420a9096f88ffa5035 +177,jpawebapi__CVE-2025-32961_v1.1.0,CVE-2025-32961,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),cuba-platform,jpawebapi,v1.1.0,https://github.com/cuba-platform/jpawebapi,GHSA-hg25-w3vg-7279,14fa1acacc2401f75a639fe33e71961460b97505,78b837d7e2b12d0df69cef1bc6042ebf3bdaf22c +178,restapi__CVE-2025-32960_v7.2.6,CVE-2025-32960,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),cuba-platform,restapi,v7.2.6,https://github.com/cuba-platform/restapi,GHSA-88h5-34xw-2q56,f0f76a8fa8f087e98ac715430a7f142965c9282a,b3d599f6657d7e212fdb134a61ab5e0888669eb1 +179,cuba__CVE-2025-32959_7.2.22,CVE-2025-32959,CWE-770,CWE-770: Allocation of Resources Without Limits or Throttling,cuba-platform,cuba,7.2.22,https://github.com/cuba-platform/cuba,GHSA-w3mp-6vrj-875g,9ab5f77c5886712d3c29aeacaf9309f9dc543f65,42b6c00fd0572b8e52ae31afd1babc827a3161a1 +180,templating-engine-plugin__CVE-2025-31722_2.5.3,CVE-2025-31722,CWE-94,CWE-94: Improper Control of Generation of Code ('Code Injection'),jenkinsci,templating-engine-plugin,2.5.3,https://github.com/jenkinsci/templating-engine-plugin,GHSA-4vjp-327p-w4qv,0af836f6465f80a078a02c6f2ed2e93dd5056213,bb2b4468b3bf4cea494afb8549af4e6450972653 +181,jenkins__CVE-2025-31721_prototype-1.7,CVE-2025-31721,CWE-862,CWE-862: Missing Authorization,jenkinsci,jenkins,prototype-1.7,https://github.com/jenkinsci/jenkins,GHSA-wr6w-jxg7-qpfh,bf32018bf075c06e5df649583557c82d42d8bb5c,b3651b475302e8dba20fc63c1ff89d144ec652f0 +182,jenkins__CVE-2025-31720_prototype-1.7,CVE-2025-31720,CWE-862,CWE-862: Missing Authorization,jenkinsci,jenkins,prototype-1.7,https://github.com/jenkinsci/jenkins,GHSA-565r-pf5q-45v6,dddb4598df25527220a1e0f46d1a0d25217dd4c8,bf32018bf075c06e5df649583557c82d42d8bb5c +183,simple-queue-plugin__CVE-2025-31723_simple-queue-1.4.6,CVE-2025-31723,CWE-352,CWE-352: Cross-Site Request Forgery (CSRF),jenkinsci,simple-queue-plugin,simple-queue-1.4.6,https://github.com/jenkinsci/simple-queue-plugin,GHSA-hcfh-qjcp-34q9,c5bc23d6ddd16b0a9792dd05e843a14033e975f1,c1094666dcd139830620d6d1c21b13f847601e74 +184,camel__CVE-2025-30177_camel-4.10.2,CVE-2025-30177,CWE-164,CWE-164: Improper Neutralization of Internal Special Elements,apache,camel,camel-4.10.2,https://github.com/apache/camel,GHSA-vq4p-pchp-6g6v,4ccb68b166c0d1210966f17d18b848cdd8b64fed,9fd8fc30dbd98511a1faa0cbcf39ef5aeec88a64 +185,activemq-artemis__CVE-2025-27427_2.39.0,CVE-2025-27427,CWE-863,CWE-863: Incorrect Authorization,apache,activemq-artemis,2.39.0,https://github.com/apache/activemq-artemis,GHSA-3w85-5p9g-h334,c5bfb32ed2b71c0510d9df373c8e6a7f75ea89f4,2216a75a57f098295abb283d556c8b8bda91324d +186,netty-incubator-codec-quic__CVE-2025-29908_netty-incubator-codec-parent-quic-0.0.70.Final,CVE-2025-29908,CWE-407,CWE-407: Inefficient Algorithmic Complexity,netty,netty-incubator-codec-quic,netty-incubator-codec-parent-quic-0.0.70.Final,https://github.com/netty/netty-incubator-codec-quic,GHSA-hqqc-jr88-p6x2,dca355aa8a1f63dfaf6aa2fe88734e4bd5314c14,e059bd9b78723f8b035e0c547e42ce263f03461c +187,kylin__CVE-2025-30067_kylin-5.0.1,CVE-2025-30067,CWE-94,CWE-94: Improper Control of Generation of Code ('Code Injection'),apache,kylin,kylin-5.0.1,https://github.com/apache/kylin,GHSA-29m8-wh9p-5wc4,bd86f44d597640d64e4a5789a54c1a3f2aa7786d,21d98f3ef29f71b50dacabbf039905f9f0f71b95 +188,spring-security__CVE-2025-22223_6.4.3,CVE-2025-22223,CWE-290,CWE-290: Authentication Bypass by Spoofing,spring-projects,spring-security,6.4.3,https://github.com/spring-projects/spring-security,GHSA-hh3m-g4qj-4835,4993fa863a02008b606044cb897db6b54ec116f0,dc2e1af2dab8ef81cd4edd25b56a2babeaab8cf9 +189,druid__CVE-2025-27888_druid-31.0.1-rc2,CVE-2025-27888,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),apache,druid,druid-31.0.1-rc2,https://github.com/apache/druid,GHSA-2xcr-p767-f3rv,, +190,spring-security__CVE-2025-22228_6.3.7,CVE-2025-22228,CWE-287,CWE-287: Improper Authentication,spring-projects,spring-security,6.3.7,https://github.com/spring-projects/spring-security,GHSA-mg83-c7gq-rv5c,36ea1b11a7dae7904e3c70b5e10fb01152fec5d4,46f0dc6dfc8402cd556c598fdf2d31f9d46cdbf3 +191,zohoqengine-plugin__CVE-2025-30197_1.0.29.vfa_cc23396502,CVE-2025-30197,CWE-522,CWE-522: Insufficiently Protected Credentials,jenkinsci,zohoqengine-plugin,1.0.29.vfa_cc23396502,https://github.com/jenkinsci/zohoqengine-plugin,GHSA-2x3g-rr4w-4qrp,facc233965029a025b136efe0aa43b68cf522298,4ab1db6d6af21f43dd15cc328599445519875fa8 +192,snowflake-jdbc__CVE-2025-27496_v3.23.0,CVE-2025-27496,CWE-532,CWE-532: Insertion of Sensitive Information into Log File,snowflakedb,snowflake-jdbc,v3.23.0,https://github.com/snowflakedb/snowflake-jdbc,GHSA-q298-375f-5q63,f8ab78a9567fcc3d3b245ba5a993110df9e3c6d8,ef81582ce2f1dbc3c8794a696c94f4fe65fad507 +193,smallrye-fault-tolerance__CVE-2025-2240_6.4.1,CVE-2025-2240,CWE-1325,CWE-1325: Improperly Controlled Sequential Memory Allocation,smallrye,smallrye-fault-tolerance,6.4.1,https://github.com/smallrye/smallrye-fault-tolerance,GHSA-gfh6-3pqw-x2j4,8da7dae36f195608291687793ca9f12fd9567d93,e8bcad3d5e8bbac0a3219bd5c13661adf6ed6bbb +194,keycloak__CVE-2025-1391_26.1.2,CVE-2025-1391,CWE-284,CWE-284: Improper Access Control,keycloak,keycloak,26.1.2,https://github.com/keycloak/keycloak,GHSA-gvgg-2r3r-53x7,4b628610c42b7754d0b3f4a0283202a5dcaa9697,5aa2b4c75bb474303ab807017582bc01a9f7e378 +195,keycloak__CVE-2025-0604_26.1.2,CVE-2025-0604,CWE-287,CWE-287: Improper Authentication,keycloak,keycloak,26.1.2,https://github.com/keycloak/keycloak,GHSA-2p82-5wwr-43cw,b70303f2932dabd5f462128b1dc8a3d2640799a2,d3c50822441845cb7aeeef8cc444f09686fc6d35 +196,tomcat__CVE-2025-24813_11.0.2,CVE-2025-24813,CWE-44,CWE-44: Path Equivalence: 'file.name' (Internal Dot),apache,tomcat,11.0.2,https://github.com/apache/tomcat,GHSA-83qj-6fr2-vhqg,7d50e72fa00ad6eeab6e64ec9d34b7cc606e5a96,0a668e0c27f2b7ca0cc7c6eea32253b9b5ecb29c +197,local-s3__CVE-2025-27136_1.20,CVE-2025-27136,CWE-611,CWE-611: Improper Restriction of XML External Entity Reference,Robothy,local-s3,1.2,https://github.com/Robothy/local-s3,GHSA-g6wm-2v64-wq36,009901882be8b543e85b67c5ec2e9f30d83d62ef,d6ed756ceb30c1eb9d4263321ac683d734f8836f +198,emissary__CVE-2025-27508_8.23.0,CVE-2025-27508,CWE-327,CWE-327: Use of a Broken or Risky Cryptographic Algorithm,NationalSecurityAgency,emissary,8.23.0,https://github.com/NationalSecurityAgency/emissary,GHSA-hw43-fcmm-3m5g,ff9fed1d5910ca1879a290b78045ec991a93cb2e,da3a81a8977577597ff2a944820a5ae4e9762368 +199,OpenDJ__CVE-2025-27497_4.9.2,CVE-2025-27497,CWE-835,CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop'),OpenIdentityPlatform,OpenDJ,4.9.2,https://github.com/OpenIdentityPlatform/OpenDJ,GHSA-93qr-h8pr-4593,688a9ffc80d3c6c21c9cf1b89b1a6d8ed7d0cc1d,08aee4724608e4a32baa3c7d7499ec913a275aaf +200,solon__CVE-2025-1584_v3.0.8,CVE-2025-1584,CWE-23,CWE-23: Relative Path Traversal,opensolon,solon,v3.0.8,https://github.com/opensolon/solon,GHSA-x8q6-cchr-p7m6,87474726f1e496b381ce9d5ebbadabd0e04c2d75,f46e47fd1f8455b9467d7ead3cdb0509115b2ef1 +201,cassandra-lucene-index__CVE-2025-26511_cassandra-4.0.16-1.0.0,CVE-2025-26511,CWE-288,CWE-288: Authentication Bypass Using an Alternate Path or Channel,instaclustr,cassandra-lucene-index,cassandra-4.0.16-1.0.0,https://github.com/instaclustr/cassandra-lucene-index,GHSA-mrqp-q7vx-v2cx,75b83c55705e38a4e93fbeb3d841779810074924,94380b165bd3e597d3e22e47f8cc674ec7c7bf7f +202,netty__CVE-2025-25193_netty-4.1.117.Final,CVE-2025-25193,CWE-400,CWE-400: Uncontrolled Resource Consumption,netty,netty,netty-4.1.117.Final,https://github.com/netty/netty,GHSA-389x-839f-4rhx,f844d78e4e23182610a24576d225de933f90f92e,d1fbda62d3a47835d3fb35db8bd42ecc205a5386 +203,netty__CVE-2025-24970_netty-4.1.117.Final,CVE-2025-24970,CWE-20,CWE-20: Improper Input Validation,netty,netty,netty-4.1.117.Final,https://github.com/netty/netty,GHSA-4g8c-wm8x-jfhw,d1fbda62d3a47835d3fb35db8bd42ecc205a5386,87f40725155b2f89adfde68c7732f97c153676c4 +204,felix-dev__CVE-2025-25247_org.osgi.compendium-1.4.0,CVE-2025-25247,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),apache,felix-dev,org.osgi.compendium-1.4.0,https://github.com/apache/felix-dev,GHSA-4c37-7m5h-c8m9,c9df37190eddd3a8af4262956436880a3acb8c90,87513ea3533fdb79d9e2b251410bf2bfbd63941e +205,cassandra__CVE-2025-23015_cassandra-5.0-alpha2,CVE-2025-23015,CWE-267,CWE-267: Privilege Defined With Unsafe Actions,apache,cassandra,cassandra-5.0-alpha2,https://github.com/apache/cassandra,GHSA-wmcc-9vch-jmx4,3ddccf45213f69ac282690186484ae7b9c0151ba,6207a305ba2b0cebc3241e00a843ab5dbf86d2ed +206,s3proxy__CVE-2025-24961_s3proxy-2.5.0,CVE-2025-24961,CWE-22,CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),gaul,s3proxy,s3proxy-2.5.0,https://github.com/gaul/s3proxy,GHSA-2ccp-vqmv-4r4x,,b0819e0ef5e08c792a4d1724b938714ce9503aa3 +207,wildfly-core__CVE-2025-23367_27.0.0.Beta7,CVE-2025-23367,CWE-284,CWE-284: Improper Access Control,wildfly,wildfly-core,27.0.0.Beta7,https://github.com/wildfly/wildfly-core,GHSA-qr6x-62gq-4ccp,, +208,djl__CVE-2025-0851_v0.30.0,CVE-2025-0851,CWE-22,CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),deepjavalibrary,djl,v0.30.0,https://github.com/deepjavalibrary/djl,GHSA-jcrp-x7w3-ffmg,503289a69c581e2373e12cff78ea2adc03a8d86f,7415cc5f72aae69ea9716a5e4f709af03a77a619 +209,snowflake-jdbc__CVE-2025-24790_v3.21.1,CVE-2025-24790,CWE-276,CWE-276: Incorrect Default Permissions,snowflakedb,snowflake-jdbc,v3.21.1,https://github.com/snowflakedb/snowflake-jdbc,GHSA-33g6-495w-v8j2,3236d9840c61cdffa7093c631539523b9d1d6836,9e1a5acf12406b16c4780ca013f4c4db48b74b59 +210,snowflake-jdbc__CVE-2025-24789_v3.21.1,CVE-2025-24789,CWE-426,CWE-426: Untrusted Search Path,snowflakedb,snowflake-jdbc,v3.21.1,https://github.com/snowflakedb/snowflake-jdbc,GHSA-7hpq-3g6w-pvhf,9e1a5acf12406b16c4780ca013f4c4db48b74b59,4f01bb8f9b708c71e7a2111c87371dbfc1d53dd6 +211,oic-auth-plugin__CVE-2025-24399_4.452.v2849b_d3945fa_,CVE-2025-24399,CWE-178,CWE-178: Improper Handling of Case Sensitivity,jenkinsci,oic-auth-plugin,4.452.v2849b_d3945fa_,https://github.com/jenkinsci/oic-auth-plugin,GHSA-q9cm-88jx-3vfw,2849bd3945fa4c66fbc89da161d481565f85cdec,4d7765c854f4f5e6e3c26ed950a26042a7527875 +212,cxf__CVE-2025-23184_cxf-3.5.9,CVE-2025-23184,CWE-400,CWE-400: Uncontrolled Resource Consumption,apache,cxf,cxf-3.5.9,https://github.com/apache/cxf,GHSA-fh5r-crhr-qrrq,, +213,jte__CVE-2025-23026_3.1.15,CVE-2025-23026,CWE-79,CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),casid,jte,3.1.15,https://github.com/casid/jte,GHSA-vh22-6c6h-rm8q,0c7d4ad7a135d169b2db85062d827279e6d86aaf,a6fb00d53c7b8dbb86de933215dbe1b9191a57f1