ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-977j-xj7q-2jr9
Segmentation faultin TensorFlow when converting a Python string to `tf.float16`
### Impact Converting a string (from Python) to a `tf.float16` value results in a segmentation fault in eager mode as the format checks for this use case are only in the graph mode. This issue can lead to denial of service in inference/training where a malicious attacker can send a data point which contains a string ...
{'CVE-2020-5215'}
2021-01-08T20:32:01Z
2020-01-28T21:32:29Z
HIGH
5
{'CWE-754'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-977j-xj7q-2jr9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5215', 'https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf', 'https://github.com/advisories/GHSA-977j-xj7q-2jr9', 'https://github.com/tensorflow/tensorflo...
null
{'https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf'}
{'https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf'}
GHSA
GHSA-r478-c2pc-m7gx
DNS reply verification issue in dnslinb
The dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matches an ID value in a query.
{'CVE-2022-22846'}
2022-01-19T19:58:20Z
2022-01-12T20:07:10Z
HIGH
7.5
null
{'https://github.com/paulc/dnslib/issues/30', 'https://github.com/paulc/dnslib/commit/76e8677699ed098387d502c57980f58da642aeba', 'https://github.com/advisories/GHSA-r478-c2pc-m7gx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22846'}
null
{'https://github.com/paulc/dnslib/commit/76e8677699ed098387d502c57980f58da642aeba'}
{'https://github.com/paulc/dnslib/commit/76e8677699ed098387d502c57980f58da642aeba'}
GHSA
GHSA-v6fx-752r-ccp2
CSRF on PgHero gem
The PgHero gem through 2.6.0 for Ruby allows CSRF.
{'CVE-2020-16253'}
2021-09-23T18:37:56Z
2020-08-05T14:53:43Z
HIGH
8.1
{'CWE-352'}
{'https://github.com/ankane/pghero/issues/330', 'https://rubygems.org/gems/pghero', 'https://github.com/ankane/pghero/commit/14b67b32fed19a30aaf9826ee72f2a29cda604e9', 'https://github.com/advisories/GHSA-v6fx-752r-ccp2', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pghero/CVE-2020-16253.yml', 'https://...
null
{'https://github.com/ankane/pghero/commit/14b67b32fed19a30aaf9826ee72f2a29cda604e9'}
{'https://github.com/ankane/pghero/commit/14b67b32fed19a30aaf9826ee72f2a29cda604e9'}
GHSA
GHSA-4449-hg37-77v8
Command injection in total.js
There is a command injection vulnerability that affects the package total.js before version 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with t...
{'CVE-2020-28494'}
2021-07-28T18:57:24Z
2021-02-05T20:43:27Z
HIGH
8.6
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28494', 'https://github.com/advisories/GHSA-4449-hg37-77v8', 'https://www.npmjs.com/package/total.js', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1046672', 'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5'}
null
{'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5'}
{'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5'}
GHSA
GHSA-qffw-8wg7-h665
Command injection in git-interface
A command injection vulnerability exists in git-interface in the GitHub repository yarkeev/git-interface prior to 2.1.2. If both the git remote and destination directory are provided by user input, then the use of an `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would the...
{'CVE-2022-1440'}
2022-04-29T17:22:44Z
2022-04-23T00:03:01Z
CRITICAL
9.8
{'CWE-78'}
{'https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1440', 'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d', 'https://github.com/advisories/GHSA-qffw-8wg7-h665'}
null
{'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'}
{'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'}
GHSA
GHSA-h3rx-g5c9-8q4x
Prototype Pollution in bmoor
The package bmoor before 0.8.12 are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7736'}
2021-07-28T19:52:39Z
2021-05-10T18:37:26Z
HIGH
7.3
{'CWE-1321'}
{'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5', 'https://github.com/advisories/GHSA-h3rx-g5c9-8q4x', 'https://www.npmjs.com/package/bmoor', 'https://snyk.io/vuln/SNYK-JS-BMOOR-598664', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7736'}
null
{'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5'}
{'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5'}
GHSA
GHSA-24m3-w8g9-jwpq
Information disclosure of source code in SimpleSAMLphp
### Background The module controller in `SimpleSAML\Module` that processes requests for pages hosted by modules, has code to identify paths ending with `.php` and process those as PHP code. If no other suitable way of handling the given path exists it presents the file to the browser. ### Description The check to id...
{'CVE-2020-5301'}
2022-04-19T19:02:25Z
2020-04-22T20:59:44Z
LOW
3
{'CWE-200', 'CWE-178'}
{'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-24m3-w8g9-jwpq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5301', 'https://github.com/advisories/GHSA-24m3-w8g9-jwpq', 'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}
null
{'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}
{'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}
GHSA
GHSA-grc3-8q8m-4j7c
Improper privilege handling in Apache Accumulo
Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security funct...
{'CVE-2020-17533'}
2022-02-09T22:37:59Z
2022-02-09T22:37:59Z
HIGH
8.1
{'CWE-280', 'CWE-732'}
{'http://www.openwall.com/lists/oss-security/2020/12/29/1', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E', 'https://github.com/advisories/GHSA-grc3-8q8m-4j7c', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c9...
null
{'https://github.com/apache/accumulo/commit/877ad502f6857e48342664e4b0ce83db74e4cda4'}
{'https://github.com/apache/accumulo/commit/877ad502f6857e48342664e4b0ce83db74e4cda4'}
GHSA
GHSA-xc47-3rch-cv57
Improper Access Control in snipe-it
Users with no system permissions are able to see and create personal access tokens
{'CVE-2022-0178'}
2022-01-26T20:24:23Z
2022-01-26T20:24:23Z
MODERATE
5.4
{'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0178', 'https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368', 'https://github.com/advisories/GHSA-xc47-3rch-cv57', 'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'}
null
{'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'}
{'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'}
GHSA
GHSA-hgc3-hp6x-wpgx
Antilles Dependency Confusion Vulnerability
### Potential Impact: Remote code execution. ### Scope of Impact: Open-source project specific. ### Summary Description: A dependency confusion vulnerability was reported in the Antilles open-source software prior to version 1.0.1 that could allow for remote code execution during installation due to a package liste...
{'CVE-2021-3840'}
2021-11-17T21:17:30Z
2021-11-03T17:36:22Z
HIGH
8.8
{'CWE-427'}
{'https://github.com/advisories/GHSA-hgc3-hp6x-wpgx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3840', 'https://github.com/lenovo/Antilles/security/advisories/GHSA-hgc3-hp6x-wpgx', 'https://github.com/lenovo/Antilles/commit/c7b9c5740908b343aceefe69733d9972e64df0b9'}
null
{'https://github.com/lenovo/Antilles/commit/c7b9c5740908b343aceefe69733d9972e64df0b9'}
{'https://github.com/lenovo/Antilles/commit/c7b9c5740908b343aceefe69733d9972e64df0b9'}
GHSA
GHSA-976r-qfjj-c24w
Command injection via Celery broker in Apache Airflow
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.
{'CVE-2020-11981'}
2022-03-21T22:48:38Z
2020-07-27T16:57:33Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-976r-qfjj-c24w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11981', 'https://issues.apache.org/jira/browse/AIRFLOW-6351', 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E', 'https://github.com/apache/air...
null
{'https://github.com/apache/airflow/commit/afa4b11fddfdbadb048f742cf66d5c21c675a5c8'}
{'https://github.com/apache/airflow/commit/afa4b11fddfdbadb048f742cf66d5c21c675a5c8'}
GHSA
GHSA-qcj7-g2j5-g7r3
In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification
In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a sign...
{'CVE-2016-1000342'}
2022-04-27T13:28:11Z
2018-10-17T16:24:12Z
HIGH
7.5
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000342', 'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-...
null
{'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9'}
{'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9'}
GHSA
GHSA-7733-hjv6-4h47
Cross-Site Scripting in ternary conditional operator
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0) > * CWE-79 --- :information_source:  This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020 --- ### Problem It has been discovered that the Fluid Engine (package `typo3fluid/f...
{'CVE-2020-15241'}
2022-04-19T19:02:36Z
2020-10-08T19:55:53Z
MODERATE
4.7
{'CWE-601', 'CWE-79'}
{'https://github.com/advisories/GHSA-7733-hjv6-4h47', 'https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47', 'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d', 'https://typo3.org/security/advisory/typo3-core-sa-2019-013', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15241...
null
{'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d'}
{'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d'}
GHSA
GHSA-6vqp-h455-42mr
Uncontrolled Memory Allocation in Apache PDFBox
A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions.
{'CVE-2021-27906'}
2022-04-22T18:27:47Z
2021-05-13T22:30:13Z
MODERATE
5.5
{'CWE-789'}
{'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://issues.apache.org/jira/browse/PDFBOX-5112', 'https://lists.fedoraproject.org/archives/list/...
null
{'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f'}
{'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f'}
GHSA
GHSA-72m5-fvvv-55m6
Observable Differences in Behavior to Error Inputs in Bouncy Castle
In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short pay...
{'CVE-2020-26939'}
2021-05-26T13:31:25Z
2021-04-22T16:16:49Z
MODERATE
5.3
{'CWE-203'}
{'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E', 'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1', 'https://security.netapp.com/advisory/ntap-20201202-0005/', 'https://lists.debian.org/debian-lts-announce/20...
null
{'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1'}
{'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1'}
GHSA
GHSA-7q36-4xx7-xcxf
Untrusted data can lead to DoS attack due to hash collisions and stack overflow in MessagePack
### Impact When this library is used to deserialize messagepack data from an untrusted source, there is a risk of a denial of service attack by either of two vectors: 1. hash collisions - leading to large CPU consumption disproportionate to the size of the data being deserialized. 1. stack overflow - leading to the d...
{'CVE-2020-5234'}
2021-04-06T17:54:57Z
2020-01-31T17:59:20Z
MODERATE
4.8
{'CWE-121'}
{'https://github.com/neuecc/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf', 'https://github.com/advisories/GHSA-7q36-4xx7-xcxf', 'https://github.com/aspnet/Announcements/issues/405', 'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007', 'https://github.com/neuecc/M...
null
{'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007', 'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02'}
{'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02', 'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007'}
GHSA
GHSA-h6xw-mghq-7523
Unsafe parsing in SWHKD
SWHKD 1.1.5 allows unsafe parsing via the -c option. An information leak might occur but there is a simple denial of service (memory exhaustion) upon an attempt to parse a large or infinite file (such as a block or character device).
{'CVE-2022-27819'}
2022-04-15T16:14:51Z
2022-04-08T00:00:24Z
MODERATE
5.3
{'CWE-400'}
{'http://www.openwall.com/lists/oss-security/2022/04/14/1', 'https://github.com/waycrate/swhkd/commit/b4e6dc76f4845ab03104187a42ac6d1bbc1e0021', 'https://github.com/advisories/GHSA-h6xw-mghq-7523', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27819', 'https://github.com/waycrate/swhkd/releases', 'https://github.com/waycr...
null
{'https://github.com/waycrate/swhkd/commit/b4e6dc76f4845ab03104187a42ac6d1bbc1e0021'}
{'https://github.com/waycrate/swhkd/commit/b4e6dc76f4845ab03104187a42ac6d1bbc1e0021'}
GHSA
GHSA-q2cv-94xm-qvg4
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3921'}
2021-11-17T21:12:32Z
2021-11-15T23:18:00Z
MODERATE
5.4
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3921', 'https://huntr.dev/bounties/724d3fd5-9f04-45c4-98d6-35a7d15468f5', 'https://github.com/advisories/GHSA-q2cv-94xm-qvg4', 'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684'}
{'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684'}
GHSA
GHSA-r6jx-9g48-2r5r
Arbitrary code execution due to YAML deserialization
### Impact TensorFlow and Keras can be tricked to perform arbitrary code execution when deserializing a Keras model from YAML format. ```python from tensorflow.keras import models payload = ''' !!python/object/new:type args: ['z', !!python/tuple [], {'extend': !!python/name:exec }] listitems: "__import__('os').system...
{'CVE-2021-37678'}
2022-03-23T22:52:07Z
2021-08-25T14:41:12Z
CRITICAL
9.3
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37678', 'https://github.com/advisories/GHSA-r6jx-9g48-2r5r', 'https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6jx-9g48-2r5r'}
null
{'https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012'}
{'https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012'}
GHSA
GHSA-m9fq-c9hp-59g7
Cross-site Scripting in yourls
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in edit dialog.
{'CVE-2021-3785'}
2021-09-24T13:08:50Z
2021-09-20T20:42:52Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff', 'https://github.com/advisories/GHSA-m9fq-c9hp-59g7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3785', 'https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638'}
null
{'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff'}
{'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff'}
GHSA
GHSA-wqwf-x5cj-rg56
Arbitrary Command Injection
In Kubernetes versions 1.9.0-1.9.9, 1.10.0-1.10.5, and 1.11.0-1.11.1, user input was handled insecurely while setting up volume mounts on Windows nodes, which could lead to command line argument injection.
{'CVE-2018-1002101'}
2022-04-20T20:56:14Z
2022-02-15T01:57:18Z
MODERATE
7.1
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1002101', 'https://github.com/advisories/GHSA-wqwf-x5cj-rg56', 'https://github.com/kubernetes/kubernetes/issues/65750', 'https://github.com/kubernetes/kubernetes/pull/65751', 'http://www.securityfocus.com/bid/106238', 'https://security.netapp.com/advisory/ntap-20190416-0008/'...
null
{'https://github.com/kubernetes/kubernetes/commit/d65039c56ce4de5f2efdc38aa1284eeb95f89169'}
{'https://github.com/kubernetes/kubernetes/commit/d65039c56ce4de5f2efdc38aa1284eeb95f89169'}
GHSA
GHSA-73m2-3pwg-5fgc
Catastrophic backtracking in regex allows Denial of Service in Waitress
### Impact When waitress receives a header that contains invalid characters it will cause the regular expression engine to catastrophically backtrack causing the process to use 100% CPU time and blocking any other interactions. This would allow an attacker to send a single request with an invalid header and take the ...
{'CVE-2020-5236'}
2022-03-24T19:27:20Z
2020-02-04T03:07:31Z
CRITICAL
5.7
{'CWE-400'}
{'https://github.com/Pylons/waitress/security/advisories/GHSA-73m2-3pwg-5fgc', 'https://github.com/Pylons/waitress/commit/6e46f9e3f014d64dd7d1e258eaf626e39870ee1f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5236', 'https://github.com/advisories/GHSA-73m2-3pwg-5fgc'}
null
{'https://github.com/Pylons/waitress/commit/6e46f9e3f014d64dd7d1e258eaf626e39870ee1f'}
{'https://github.com/Pylons/waitress/commit/6e46f9e3f014d64dd7d1e258eaf626e39870ee1f'}
GHSA
GHSA-wx5j-54mm-rqqq
HTTP request smuggling in io.netty:netty-codec-http
### Impact Netty currently just skips control chars when these are present at the beginning / end of the header name. We should better fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward th...
{'CVE-2021-43797'}
2022-04-22T15:40:01Z
2021-12-09T19:09:17Z
MODERATE
6.5
{'CWE-444'}
{'https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq', 'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20220107-0003/', 'https://github.com/netty/netty/pull/11891', ...
null
{'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323'}
{'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323'}
GHSA
GHSA-xw7v-qrhc-jjg2
Access Control vulnerability in Dolibarr
An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.1, in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.
{'CVE-2021-37517'}
2022-04-18T22:21:51Z
2022-04-01T00:00:41Z
HIGH
7.5
{'CWE-863'}
{'https://github.com/Dolibarr/dolibarr/releases/tag/14.0.1', 'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c', 'https://github.com/advisories/GHSA-xw7v-qrhc-jjg2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37517'}
null
{'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'}
{'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'}
GHSA
GHSA-qwqc-28w3-fww6
Message Signature Bypass in openpgp
Versions of `openpgp` prior to 4.2.0 are vulnerable to Message Signature Bypass. The package fails to verify that a message signature is of type `text`. This allows an attacker to to construct a message with a signature type that only verifies subpackets without additional input (such as `standalone` or `timestamp`). F...
{'CVE-2019-9153'}
2021-08-17T22:06:13Z
2019-08-23T21:42:20Z
HIGH
7.5
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9153', 'https://www.npmjs.com/advisories/1160', 'https://github.com/advisories/GHSA-qwqc-28w3-fww6', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a...
null
{'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc'}
{'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc'}
GHSA
GHSA-5pv7-hx9m-8jh3
Missing permission checks in Jenkins Publish Over FTP Plugin
Missing permission checks in Jenkins Publish Over FTP Plugin prior to 1.17 allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials.
{'CVE-2022-29051'}
2022-05-05T15:29:48Z
2022-04-13T00:00:16Z
MODERATE
4.3
{'CWE-862'}
{'https://github.com/advisories/GHSA-5pv7-hx9m-8jh3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29051', 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321'}
null
{'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}
{'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}
GHSA
GHSA-76mp-659p-rw65
Users registered with email verification can self re-activate their disabled accounts
### Impact A user disabled on a wiki using email verification for registration can re-activate himself by using the activation link provided for his registration. ### Patches The problem has been patched in the following versions of XWiki: 11.10.13, 12.6.7, 12.10.2, 13.0. ### Workarounds It's possible to workaround...
{'CVE-2021-32620'}
2021-06-08T17:00:19Z
2021-05-18T18:36:21Z
HIGH
8.8
{'CWE-285'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32620', 'https://github.com/xwiki/xwiki-platform/commit/f9a677408ffb06f309be46ef9d8df1915d9099a4', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-76mp-659p-rw65', 'https://github.com/advisories/GHSA-76mp-659p-rw65', 'https://jira.xwiki.org/browse/XWIKI-1794...
null
{'https://github.com/xwiki/xwiki-platform/commit/f9a677408ffb06f309be46ef9d8df1915d9099a4'}
{'https://github.com/xwiki/xwiki-platform/commit/f9a677408ffb06f309be46ef9d8df1915d9099a4'}
GHSA
GHSA-3h8m-483j-7xxm
Heap out of bounds read in `RequantizationRange`
### Impact The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs: ```python import tensorflow as tf input = tf.constant([1], shape=[1], dtype=tf.qint32) input_max = tf.constant([], dtype=tf.float32) input_min = ...
{'CVE-2021-29569'}
2021-05-21T14:25:22Z
2021-05-21T14:25:22Z
LOW
2.5
{'CWE-125'}
{'https://github.com/advisories/GHSA-3h8m-483j-7xxm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3h8m-483j-7xxm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29569', 'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e'}
null
{'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e'}
{'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e'}
GHSA
GHSA-mcg6-h362-cmq5
Improper Authorization in cobbler
### Impact If PAM is correctly configured and a user account is set to expired, the expired user-account is still able to successfully log into Cobbler in all places (Web UI, CLI & XMLRPC-API). The same applies to user accounts with passwords set to be expired. ### Patches There is a patch for the latest Cobbler `3...
{'CVE-2022-0860'}
2022-04-01T20:11:34Z
2022-03-11T20:52:04Z
HIGH
8.2
{'CWE-863', 'CWE-285'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0860', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYWYHWVVRUSPCV5SWBOSAMQJQLTSBTKY/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4KCNZYBQC2FM5SEEDRQZO4LRZ4ZECMG/', 'http...
null
{'https://github.com/cobbler/cobbler/commit/9044aa990a94752fa5bd5a24051adde099280bfa'}
{'https://github.com/cobbler/cobbler/commit/9044aa990a94752fa5bd5a24051adde099280bfa'}
GHSA
GHSA-vjw7-6gfq-6wf5
Path Traversal in Eclipse Vert
In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0-milestone1, 4.0.0-milestone2, 4.0.0-milestone3, 4.0.0-milestone4, 4.0.0-milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working direct...
{'CVE-2019-17640'}
2022-02-10T20:28:57Z
2022-02-10T20:28:57Z
CRITICAL
9.8
{'CWE-23', 'CWE-22'}
{'https://lists.apache.org/thread.html/r591f6932560c8c46cee87415afed92924a982189fea7f7c9096f8e33@%3Ccommits.pulsar.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567416', 'https://lists.apache.org/thread.html/r8383b5e7344a8b872e430ad72241b84b83e9701d275c602cfe34a941@%3Ccommits.servicecomb.apache.org%3E'...
null
{'https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4'}
{'https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4'}
GHSA
GHSA-6vfw-74wr-3chh
Cross-site Scripting in Crater Invoice
Crater invoice prior to version 6.0.0 has a cross-site scripting vulnerability.
{'CVE-2022-0372'}
2022-02-10T22:25:39Z
2022-01-28T00:03:42Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0372', 'https://huntr.dev/bounties/563232b9-5a93-4f4d-8389-ed805b262ef1', 'https://github.com/advisories/GHSA-6vfw-74wr-3chh', 'https://github.com/crater-invoice/crater/pull/681'}
null
{'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}
{'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}
GHSA
GHSA-hwr7-8gxx-fj5p
Null pointer dereference in `RaggedTensorToTensor`
### Impact Sending invalid argument for `row_partition_types` of `tf.raw_ops.RaggedTensorToTensor` API results in a null pointer dereference and undefined behavior: ```python import tensorflow as tf tf.raw_ops.RaggedTensorToTensor( shape=1, values=10, default_value=21, row_partition_tensors=tf.constant([0,0,0...
{'CVE-2021-37638'}
2021-08-25T14:44:09Z
2021-08-25T14:44:09Z
HIGH
7.7
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37638', 'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314', 'https://github.com/advisories/GHSA-hwr7-8gxx-fj5p', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hwr7-8gxx-fj5p'}
null
{'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314'}
{'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314'}
GHSA
GHSA-84fq-6626-w5fg
CORS Token Disclosure in crumb
When CORS is enabled on a hapi route handler, it is possible to set a crumb token for a different domain. An attacker would need to have an application consumer visit a site they control, request a route supporting CORS, and then retrieve the token. With this token, they could possibly make requests to non CORS routes ...
{'CVE-2014-7193'}
2021-07-19T21:45:56Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-7193', 'https://nodesecurity.io/advisories/crumb_cors_token_disclosure', 'https://github.com/advisories/GHSA-84fq-6626-w5fg', 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4...
null
{'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'}
{'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'}
GHSA
GHSA-q8gv-q7wr-9jf8
Segfault in Tensorflow
### Impact In eager mode, TensorFlow does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/session_ops.cc#L45 I...
{'CVE-2020-15204'}
2021-08-26T15:17:13Z
2020-09-25T18:28:41Z
MODERATE
5.3
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15204', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8gv-q7wr-9jf8', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-q8gv-q7wr-9jf8', 'https://github.com/tensorflow/tensorflow/commit/9a13...
null
{'https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1'}
{'https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1'}
GHSA
GHSA-jwqp-28gf-p498
HTTP authentication credentials potentially leaked to target websites
### Impact If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes ...
{'CVE-2021-41125'}
2022-04-25T23:42:17Z
2021-10-06T17:46:22Z
MODERATE
5.7
{'CWE-200', 'CWE-522'}
{'http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth', 'https://github.com/advisories/GHSA-jwqp-28gf-p498', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41125', 'https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498', 'https://lists.debian.org...
null
{'https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6'}
{'https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6'}
GHSA
GHSA-7423-5qfm-g648
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0917, CVE-2019-0922, CVE-20...
{'CVE-2019-0916'}
2021-03-29T21:00:09Z
2021-03-29T21:00:09Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0916', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0916', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f',...
null
{'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}
GHSA
GHSA-v94v-pxqp-5qgj
Cross-site Scripting in ShowDoc
The upload feature of ShowDoc prior to version 2.10.4 allows files with the extension `.*html`, which leads to stored cross-site scripting.
{'CVE-2022-0950'}
2022-03-29T21:28:09Z
2022-03-16T00:00:48Z
MODERATE
5.4
{'CWE-434', 'CWE-79'}
{'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0950', 'https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc', 'https://github.com/advisories/GHSA-v94v-pxqp-5qgj'}
null
{'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}
{'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}
GHSA
GHSA-xcvv-84j5-jw9h
Prototype Pollution in assign-deep
Versions of `assign-deep` before 0.4.7 are vulnerable to prototype pollution via merging functions. ## Recommendation Update to version 0.4.7 or later.
{'CVE-2018-3720'}
2021-01-08T00:07:35Z
2018-07-26T15:12:31Z
LOW
0
{'CWE-471'}
{'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11', 'https://github.com/advisories/GHSA-xcvv-84j5-jw9h', 'https://hackerone.com/reports/310707', 'https://www.npmjs.com/advisories/579', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3720'}
null
{'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11'}
{'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11'}
GHSA
GHSA-j8cx-j9j2-f29w
Insecure Storage of Sensitive Information in Microweber
Microweber prior to version 1.3 does not strip images of EXIF data, exposing information about users' locations, device hardware, and device software.
{'CVE-2022-0724'}
2022-02-26T01:18:37Z
2022-02-24T00:00:53Z
HIGH
0
{'CWE-922'}
{'https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062', 'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3', 'https://github.com/advisories/GHSA-j8cx-j9j2-f29w', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0724'}
null
{'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3'}
{'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3'}
GHSA
GHSA-c7pp-g2v2-2766
DOM-based XSS in gmail-js
Affected versions of `gmail-js` are vulnerable to cross-site scripting in the `tools.parse_response`, `helper.get.visible_emails_post`, and `helper.get.email_data_post` functions, which pass user input directly into the Function constructor. ## Recommendation Update to version 0.6.5 or later.
{'CVE-2016-1000228'}
2021-09-23T21:31:56Z
2020-09-01T15:32:04Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/125', 'https://github.com/KartikTalwar/gmail.js/issues/281', 'https://github.com/advisories/GHSA-c7pp-g2v2-2766', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000228', 'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1'}
null
{'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1'}
{'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1'}
GHSA
GHSA-f92j-qf46-p6vm
Reflected Cross-site Scripting in ACS Commons
### Impact ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vu...
{'CVE-2021-21028'}
2021-02-12T18:04:29Z
2021-02-02T15:46:52Z
HIGH
0
{'CWE-416', 'CWE-79'}
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://helpx.adobe.com/security/products/acrobat/apsb21-09.html', 'https://github.com/advisories/GHSA-f92j-qf46-p6vm', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a1...
null
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'}
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'}
GHSA
GHSA-qhxx-j73r-qpm2
Uninitialized memory access in TensorFlow
### Impact Under certain cases, a saved model can trigger use of uninitialized values during code execution. This is caused by having tensor buffers be filled with the default value of the type but forgetting to [default initialize the quantized floating point types in Eigen](https://github.com/tensorflow/tensorflow/bl...
{'CVE-2020-26266'}
2021-01-07T22:36:21Z
2020-12-10T19:07:24Z
LOW
4.4
{'CWE-908'}
{'https://github.com/advisories/GHSA-qhxx-j73r-qpm2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qhxx-j73r-qpm2', 'https://github.com/tensorflow/tensorflow/commit/ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26266'}
null
{'https://github.com/tensorflow/tensorflow/commit/ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2'}
{'https://github.com/tensorflow/tensorflow/commit/ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2'}
GHSA
GHSA-4cpg-3vgw-4877
Prototype pollution in Plist
Prototype pollution vulnerability via `.parse()` in Plist allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.
{'CVE-2022-22912'}
2022-03-26T00:39:16Z
2022-02-18T00:00:33Z
CRITICAL
9.8
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22912', 'https://github.com/TooTallNate/plist.js/pull/118', 'https://github.com/advisories/GHSA-4cpg-3vgw-4877', 'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6be0c9e0c4773226d14b4758de52', 'https://github.com/TooTallNate/plist.js/issues/114'}
null
{'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6be0c9e0c4773226d14b4758de52'}
{'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6be0c9e0c4773226d14b4758de52'}
GHSA
GHSA-9hx4-qm7h-x84j
Cross-site Scripting in Gogs
Cross-site scripting (XSS) vulnerability in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.8 allows remote attackers to inject arbitrary web script or HTML via the text parameter to api/v1/markdown.
{'CVE-2014-8683'}
2021-06-29T18:32:53Z
2021-06-29T18:32:53Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-9hx4-qm7h-x84j', 'https://gogs.io/docs/intro/change_log.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98693', 'https://seclists.org/fulldisclosure/2014/Nov/31', 'https://packetstormsecurity.com/files/129118/Gogs-Markdown-Renderer-Cross-Site-Scripting.html', 'https://n...
null
{'https://github.com/gogits/gogs/commit/3abc41cccab2486012b46305827433ad6f5deade'}
{'https://github.com/gogits/gogs/commit/3abc41cccab2486012b46305827433ad6f5deade'}
GHSA
GHSA-2hwx-mjrm-v3g8
Denial of service attack via .well-known lookups
### Impact A malicious homeserver could redirect requests to their .well-known file to a large file. This can lead to a denial of service attack where homeservers will consume significantly more resources when requesting the .well-known file of a malicious homeserver. This affects any server which accepts federation r...
{'CVE-2021-21274'}
2022-04-19T19:02:47Z
2021-03-01T19:34:54Z
MODERATE
4.3
{'CWE-400'}
{'https://github.com/matrix-org/synapse/pull/8950', 'https://github.com/matrix-org/synapse/releases/tag/v1.25.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21274', 'https://github.com/advisories/GHSA-2hwx-mjrm-v3g8', 'https://github.com/matrix-org/synapse/commit/ff5c4da1289cb5e097902b3e55b771be342c29d6', 'https://gith...
null
{'https://github.com/matrix-org/synapse/commit/ff5c4da1289cb5e097902b3e55b771be342c29d6'}
{'https://github.com/matrix-org/synapse/commit/ff5c4da1289cb5e097902b3e55b771be342c29d6'}
GHSA
GHSA-q7rv-6hp3-vh96
Improper Input Validation in guzzlehttp/psr7
### Impact In proper header parsing. An attacker could sneak in a new line character and pass untrusted values. ### Patches The issue is patched in 1.8.4 and 2.1.1 ### Workarounds There are no known workarounds.
{'CVE-2022-24775'}
2022-03-29T21:58:29Z
2022-03-25T19:26:33Z
HIGH
7.5
{'CWE-20'}
{'https://www.drupal.org/sa-core-2022-006', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24775', 'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96', 'https://github.com/advisories/GHSA-q7rv-6hp3-vh96', 'https...
null
{'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'}
{'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'}
GHSA
GHSA-h6w6-xmqv-7q78
High severity vulnerability that affects activerecord
Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name.
{'CVE-2011-2930'}
2021-09-14T15:35:28Z
2017-10-24T18:33:38Z
HIGH
0
{'CWE-89'}
{'http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplain', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://...
null
{'https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85'}
{'https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85'}
GHSA
GHSA-2x7h-96h5-rq84
Path Traversal in SharpZipLib
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.3.0 and prior to version 1.3.3, a check was added if the destination file is under destination directory. However, it is not enforced that `destDir` ends with slash. If the `destDir` is not slash terminated like `/home/user/dir` it is po...
{'CVE-2021-32841'}
2022-02-08T19:44:46Z
2022-02-01T16:22:57Z
MODERATE
4
{'CWE-22'}
{'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3', 'https://github.com/advisories/GHSA-2x7h-96h5-rq84', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32841', 'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea...
null
{'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'}
{'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'}
GHSA
GHSA-7r94-xv9v-63jw
A use of uninitialized value vulnerability in Tensorflow
### Impact TensorFlow's Grappler optimizer has a [use of unitialized variable](https://github.com/tensorflow/tensorflow/blob/3457a2b122e50b4d44ceaaed5a663d635e5c22df/tensorflow/core/grappler/optimizers/auto_parallel.cc#L155-L164): ```cc const NodeDef* dequeue_node; for (const auto& train_node : train_nodes) { ...
{'CVE-2021-41225'}
2021-11-10T18:44:11Z
2021-11-10T18:44:11Z
MODERATE
5.5
{'CWE-908'}
{'https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41225', 'https://github.com/advisories/GHSA-7r94-xv9v-63jw', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7r94-xv9v-63jw'}
null
{'https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3'}
{'https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3'}
GHSA
GHSA-fxwv-953p-7qpf
Phusion Passenger allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header
agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in ...
{'CVE-2015-7519'}
2022-04-26T18:27:08Z
2018-10-10T17:29:13Z
LOW
3.7
{'CWE-20'}
{'https://blog.phusion.nl/2015/12/07/cve-2015-7519/', 'http://www.openwall.com/lists/oss-security/2015/12/07/1', 'http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00024.html', 'https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e', 'https://puppet.com/security/cve/passenge...
null
{'https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e'}
{'https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e'}
GHSA
GHSA-vq2r-5xvm-3hc3
Segfault in `CTCBeamSearchDecoder`
### Impact Due to lack of validation in `tf.raw_ops.CTCBeamSearchDecoder`, an attacker can trigger denial of service via segmentation faults: ```python import tensorflow as tf inputs = tf.constant([], shape=[18, 8, 0], dtype=tf.float32) sequence_length = tf.constant([11, -43, -92, 11, -89, -83, -35, -100], shape=[8],...
{'CVE-2021-29581'}
2021-05-21T14:26:30Z
2021-05-21T14:26:30Z
LOW
2.5
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29581', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq2r-5xvm-3hc3', 'https://github.com/advisories/GHSA-vq2r-5xvm-3hc3', 'https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e'}
null
{'https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e'}
{'https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e'}
GHSA
GHSA-c9g6-9335-x697
Improper Input Validation in SocksJS-Node
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
{'CVE-2020-7693'}
2021-04-20T15:25:19Z
2021-04-13T15:27:51Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7693', 'https://github.com/sockjs/sockjs-node/pull/265', 'https://github.com/sockjs/sockjs-node/issues/252', 'https://www.npmjs.com/package/sockjs', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEB...
null
{'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16'}
{'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16'}
GHSA
GHSA-pwhf-39xg-4rxw
Script injection
### Impact A malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same ...
{'CVE-2021-32660'}
2021-06-21T22:43:31Z
2021-06-04T19:09:35Z
MODERATE
6.8
{'CWE-434', 'CWE-77'}
{'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c', 'https://github.com/advisories/GHSA-pwhf-39xg-4rxw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32660', 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03', 'https://github.com/backstage/backstage/security/ad...
null
{'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}
{'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}
GHSA
GHSA-wjfq-88q2-r34j
Unhandled exception when decoding form response JSON
### Impact When handling form responses from the client (`ModalFormResponsePacket`), the Minecraft Windows client may send weird JSON that `json_decode()` can't understand. A workaround for this is implemented in `InGamePacketHandler::stupid_json_decode()`. An `InvalidArgumentException` is thrown by this function when...
null
2022-04-19T19:03:21Z
2022-01-21T23:02:14Z
HIGH
7.5
null
{'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wjfq-88q2-r34j', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.7/changelogs/4.0.md#407', 'https://github.com/advisories/GHSA-wjfq-88q2-r34j', 'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'}
null
{'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'}
{'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'}
GHSA
GHSA-rcjj-h6gh-jf3r
Information Disclosure in Apache Groovy
Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods ment...
{'CVE-2020-17521'}
2022-04-22T18:24:10Z
2020-12-09T19:03:03Z
MODERATE
5.5
{'CWE-379'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/rea63a4666ba245d2892471307772a2d8ce0f0741f341d6576625c1b3@%3Cdev.atlas.apache.org%3E', 'https://se...
null
{'https://github.com/apache/groovy/commit/bcbe5c4c76db83736166530647c024ac1e47ef28'}
{'https://github.com/apache/groovy/commit/bcbe5c4c76db83736166530647c024ac1e47ef28'}
GHSA
GHSA-2rmp-fw5r-j5qv
Improper Authentication in InfluxDB
InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).
{'CVE-2019-20933'}
2021-05-18T18:22:05Z
2021-05-18T18:22:05Z
CRITICAL
9.8
{'CWE-287'}
{'https://www.debian.org/security/2021/dsa-4823', 'https://github.com/influxdata/influxdb/commit/761b557315ff9c1642cf3b0e5797cd3d983a24c0', 'https://github.com/influxdata/influxdb/issues/12927', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00030.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20933', 'htt...
null
{'https://github.com/influxdata/influxdb/commit/761b557315ff9c1642cf3b0e5797cd3d983a24c0'}
{'https://github.com/influxdata/influxdb/commit/761b557315ff9c1642cf3b0e5797cd3d983a24c0'}
GHSA
GHSA-q3j3-w37x-hq2q
Webcache Poisoning in symfony/http-kernel
Description ----------- When a Symfony application is running behind a proxy or a load-balancer, you can tell Symfony to look for the `X-Forwarded-*` HTTP headers. HTTP headers that are not part of the "trusted_headers" allowed list are ignored and protect you from "Cache poisoning" attacks. In Symfony 5.2, we've ad...
{'CVE-2021-41267'}
2022-04-19T19:03:15Z
2021-11-24T20:04:25Z
MODERATE
6.5
{'CWE-444'}
{'https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q', 'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4126...
null
{'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487'}
{'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487'}
GHSA
GHSA-qm57-vhq3-3fwf
Header injection possible in Django
In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpRespo...
{'CVE-2021-32052'}
2021-06-14T21:29:19Z
2021-06-09T17:14:51Z
MODERATE
6.1
{'CWE-88', 'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32052', 'https://github.com/django/django/commit/e1e81aa1c4427411e3c68facdd761229ffea6f6f', 'http://www.openwall.com/lists/oss-security/2021/05/06/1', 'https://groups.google.com/forum/#!forum/django-announce', 'https://bugzilla.redhat.com/show_bug.cgi?id=1944801', 'https://ww...
null
{'https://github.com/django/django/commit/e1e81aa1c4427411e3c68facdd761229ffea6f6f'}
{'https://github.com/django/django/commit/e1e81aa1c4427411e3c68facdd761229ffea6f6f'}
GHSA
GHSA-rj44-gpjc-29r7
[thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values
### Impact Potential for arbitrary code execution in `#gpg`-tagged property values (only if `decrypt: true` option is enabled) ### Patches [A fix](https://github.com/thi-ng/umbrella/commit/3e14765d6bfd8006742c9e7860bc7d58ae94dfa5) has already been released as v0.4.0 ### Workarounds By default, EGF parse functions ...
{'CVE-2021-21412'}
2022-04-19T19:02:52Z
2021-04-06T17:22:41Z
MODERATE
6.4
{'CWE-78'}
{'https://www.npmjs.com/package/@thi.ng/egf', 'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21412', 'https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7', 'https://github.com/thi-ng/umbrella/blob/develop/packages/e...
null
{'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243'}
{'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243'}
GHSA
GHSA-rhm9-p9w5-fwm7
Symmetrically encrypting large values can lead to integer overflow
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. When certain sequences of `update()` calls with large values (multiple GBs) for symetric encryption or decryption occur, it's possible for an integer overflow to happen, leading to mishandling of buffers. This is pat...
{'CVE-2020-36242'}
2022-04-22T18:32:24Z
2021-02-10T01:32:27Z
CRITICAL
9.1
{'CWE-787', 'CWE-190'}
{'https://github.com/pyca/cryptography/security/advisories/GHSA-rhm9-p9w5-fwm7', 'https://github.com/pyca/cryptography/compare/3.3.1...3.3.2', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/pyca/cryptography/issues/5615', 'https://github.com/advisories/GHSA-rhm9-p9w5-fwm7', 'https://githu...
null
{'https://github.com/pyca/cryptography/commit/82b6ce28389f0a317bc55ba2091a74b346db7cae'}
{'https://github.com/pyca/cryptography/commit/82b6ce28389f0a317bc55ba2091a74b346db7cae'}
GHSA
GHSA-p4pj-mg4r-x6v4
Denial of Service in uap-core
## Impact Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. ## Patches Please update uap-core to >= v0.11.0 Downs...
{'CVE-2021-21317'}
2021-02-17T17:18:55Z
2021-02-02T15:46:38Z
HIGH
5.3
{'CWE-400'}
{'https://www.npmjs.com/package/uap-core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21317', 'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c', 'https://github.com/ua-parser/uap-core/security/advisories/GHSA-p4pj-mg4r-x6v4', 'https://github.com/advisories/GHSA-p4pj-mg4r-x6v4'}
null
{'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c'}
{'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c'}
GHSA
GHSA-93xj-8mrv-444m
Regular Expression Denial of Service (REDoS) in httplib2
### Impact A malicious server which responds with long series of `\xa0` characters in the `www-authenticate` header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. ### Patches Version 0.19.0 contains new implementation of auth headers parsing, using pyparsing l...
{'CVE-2021-21240'}
2022-04-19T19:02:44Z
2021-02-08T19:41:59Z
LOW
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-93xj-8mrv-444m', 'https://pypi.org/project/httplib2', 'https://github.com/httplib2/httplib2/pull/182', 'https://github.com/httplib2/httplib2/security/advisories/GHSA-93xj-8mrv-444m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21240', 'https://github.com/httplib2/httplib2/commit/bd9e...
null
{'https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc'}
{'https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc'}
GHSA
GHSA-6r3c-8xf3-ggrr
Directory traversal outside of SENDFILE_ROOT in django-sendfile2
django-sendfile2 currently relies on the backend to correctly limit file paths to `SENDFILE_ROOT`. This is not the case for the `simple` and `development` backends, it is also not necessarily the case for any of the other backends either (it's just an assumption that was made by the original author). This will be fixe...
null
2022-04-19T19:02:28Z
2020-06-24T17:15:26Z
MODERATE
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-6r3c-8xf3-ggrr', 'https://github.com/moggers87/django-sendfile2/security/advisories/GHSA-6r3c-8xf3-ggrr', 'https://github.com/moggers87/django-sendfile2/commit/f870c52398a55b9b5189932dd8caa24efb4bc1e1'}
null
{'https://github.com/moggers87/django-sendfile2/commit/f870c52398a55b9b5189932dd8caa24efb4bc1e1'}
{'https://github.com/moggers87/django-sendfile2/commit/f870c52398a55b9b5189932dd8caa24efb4bc1e1'}
GHSA
GHSA-pfj7-2qfw-vwgm
Path traversal in translator module in NodeBB
### Impact Prior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory. ### Patches The vulnerability has been patched as of v1.18.5. ### Workarounds Cherry-pick commit hash `c8b2fc46dc698db687379106b3f01c71b80f495f` to receive th...
{'CVE-2021-43788'}
2022-04-19T19:03:13Z
2021-11-30T22:20:43Z
MODERATE
5
{'CWE-22'}
{'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-pfj7-2qfw-vwgm', 'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43788', 'https://github.com/advisories/GHSA-pfj7-2qfw-vwgm', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5'...
null
{'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f'}
{'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f'}
GHSA
GHSA-rc8h-3fv6-pxv8
Denial of Service in hapi
Versions of `hapi` prior to 11.1.3 are affected by a denial of service vulnerability. The vulnerability is triggered when certain input is passed into the If-Modified-Since or Last-Modified headers. This causes an 'illegal access' exception to be raised, and instead of sending a HTTP 500 error back to the sender, hap...
{'CVE-2015-9241'}
2021-01-08T01:58:05Z
2018-06-07T19:43:15Z
HIGH
0
{'CWE-400'}
{'https://nodesecurity.io/advisories/63', 'https://github.com/jfhbrook/node-ecstatic/pull/179', 'https://github.com/advisories/GHSA-rc8h-3fv6-pxv8', 'https://nodesecurity.io/advisories/64', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9241', 'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580'...
null
{'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580'}
{'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580'}
GHSA
GHSA-fxwf-45c7-4ppr
Prototype pollution in object-hierarchy-access
Overview:Prototype pollution vulnerability in ‘object-hierarchy-access’ versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28270'}
2022-01-07T16:07:29Z
2021-10-12T16:40:58Z
CRITICAL
9.8
{'CWE-1321', 'CWE-915'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270', 'https://github.com/advisories/GHSA-fxwf-45c7-4ppr', 'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28270', 'https://www.whitesourcesoftware.com...
null
{'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572'}
{'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572'}
GHSA
GHSA-jj47-x69x-mxrm
Buffer Overflow in yajl-ruby
yajl-ruby is a streaming JSON parsing and encoding library for Ruby (C bindings to yajl) based on the YAJL library. The 1.x branch and the 2.x branch of [yajl](https://github.com/lloyd/yajl) contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. ### Details ...
{'CVE-2022-24795'}
2022-04-06T21:08:35Z
2022-04-05T15:55:51Z
MODERATE
5.9
{'CWE-122', 'CWE-190'}
{'https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6', 'https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm', 'https://github.com/advisories/GHSA-jj47-x69x-mxrm', 'https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/y...
null
{'https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6'}
{'https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6'}
GHSA
GHSA-7cqx-92hp-x6wh
Heap buffer overflow in `MaxPool3DGradGrad`
### Impact The implementation of `tf.raw_ops.MaxPool3DGradGrad` is vulnerable to a heap buffer overflow: ```python import tensorflow as tf values = [0.01] * 11 orig_input = tf.constant(values, shape=[11, 1, 1, 1, 1], dtype=tf.float32) orig_output = tf.constant([0.01], shape=[1, 1, 1, 1, 1], dtype=tf.float32) grad = ...
{'CVE-2021-29576'}
2022-04-26T18:10:15Z
2021-05-21T14:26:16Z
LOW
2.5
{'CWE-119', 'CWE-787'}
{'https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09', 'https://github.com/advisories/GHSA-7cqx-92hp-x6wh', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7cqx-92hp-x6wh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29576'}
null
{'https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09'}
{'https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09'}
GHSA
GHSA-947x-pv47-pp3q
Cross-site scripting in pywb
Webrecorder pywb before 2.6.0 allows XSS because it does not ensure that Jinja2 templates are autoescaped.
{'CVE-2021-39286'}
2021-09-02T17:16:18Z
2021-09-02T17:16:18Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/webrecorder/pywb/compare/v-2.5.0...v-2.6.0', 'https://github.com/webrecorder/pywb/commit/f7bd84cdacdd665ff73ae8d09a202f60be2ebae9', 'https://github.com/advisories/GHSA-947x-pv47-pp3q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39286'}
null
{'https://github.com/webrecorder/pywb/commit/f7bd84cdacdd665ff73ae8d09a202f60be2ebae9'}
{'https://github.com/webrecorder/pywb/commit/f7bd84cdacdd665ff73ae8d09a202f60be2ebae9'}
GHSA
GHSA-mfjm-vh54-3f96
Cookie-setting is not restricted based on the public suffix list
### Impact Responses from domain names whose public domain name suffix contains 1 or more periods (e.g. responses from `example.co.uk`, given its public domain name suffix is `co.uk`) are able to set cookies that are included in requests to any other domain sharing the same domain name suffix. ### Patches Upgrade to...
null
2022-03-02T14:52:47Z
2022-03-01T22:13:28Z
MODERATE
0
null
{'https://github.com/scrapy/scrapy/commit/e865c4430e58a4faa0e0766b23830f8423d6167a', 'https://github.com/scrapy/scrapy/security/advisories/GHSA-mfjm-vh54-3f96', 'https://github.com/advisories/GHSA-mfjm-vh54-3f96'}
null
{'https://github.com/scrapy/scrapy/commit/e865c4430e58a4faa0e0766b23830f8423d6167a'}
{'https://github.com/scrapy/scrapy/commit/e865c4430e58a4faa0e0766b23830f8423d6167a'}
GHSA
GHSA-rmr5-cpv2-vgjf
Denial of Service by injecting highly recursive collections or maps in XStream
### Impact The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. ### Patches XStream 1.4.19 monitors and accumulates the time it takes t...
{'CVE-2021-43859'}
2022-04-22T15:34:22Z
2022-02-01T00:48:15Z
HIGH
7.5
{'CWE-400', 'CWE-502'}
{'https://github.com/x-stream/xstream/security/advisories/GHSA-rmr5-cpv2-vgjf', 'https://github.com/x-stream/xstream/commit/e8e88621ba1c85ac3b8620337dd672e0c0c3a846', 'http://www.openwall.com/lists/oss-security/2022/02/09/1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/messag...
null
{'https://github.com/x-stream/xstream/commit/e8e88621ba1c85ac3b8620337dd672e0c0c3a846'}
{'https://github.com/x-stream/xstream/commit/e8e88621ba1c85ac3b8620337dd672e0c0c3a846'}
GHSA
GHSA-645p-88qh-w398
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.
{'CVE-2018-14718'}
2021-06-11T15:54:20Z
2019-01-04T19:06:55Z
CRITICAL
9.8
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2019:3140', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://ac...
null
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
GHSA
GHSA-wxj7-97fp-j53j
Exposure of Resource to Wrong Sphere in Zip-Local
The package zip-local before 0.3.5 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) which can lead to an extraction of a crafted file outside the intended extraction directory.
{'CVE-2021-23484'}
2022-02-07T21:20:29Z
2022-02-01T00:46:01Z
CRITICAL
9.8
{'CWE-668', 'CWE-29'}
{'https://snyk.io/vuln/SNYK-JS-ZIPLOCAL-2327477', 'https://github.com/advisories/GHSA-wxj7-97fp-j53j', 'https://github.com/Mostafa-Samir/zip-local/blob/master/main.js%23L365', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23484', 'https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085'}
null
{'https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085'}
{'https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085'}
GHSA
GHSA-r5qj-cvf9-p85h
Code Injection in PyTorch Lightning
PyTorch Lightning version 1.5.10 and prior is vulnerable to code injection. There is currently a [patch](https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae) available, anticipated to be part of the `1.6.0` release.
{'CVE-2022-0845'}
2022-03-18T21:16:06Z
2022-03-06T00:00:16Z
CRITICAL
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0845', 'https://github.com/advisories/GHSA-r5qj-cvf9-p85h', 'https://github.com/PyTorchLightning/pytorch-lightning/pull/12212', 'https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae', 'https://huntr.dev/bounties/a795bf93-c91e-4...
null
{'https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae'}
{'https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae'}
GHSA
GHSA-f5cx-5wr3-5qrc
Reference binding to nullptr in boosted trees
### Impact An attacker can generate undefined behavior via a reference binding to nullptr in `BoostedTreesCalculateBestGainsPerFeature`: ```python import tensorflow as tf tf.raw_ops.BoostedTreesCalculateBestGainsPerFeature( node_id_range=[], stats_summary_list=[[1,2,3]], l1=[1.0], l2=[1.0], tree_complexity ...
{'CVE-2021-37662'}
2021-08-25T14:42:26Z
2021-08-25T14:42:26Z
HIGH
7.1
{'CWE-824'}
{'https://github.com/tensorflow/tensorflow/commit/9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad', 'https://github.com/advisories/GHSA-f5cx-5wr3-5qrc', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f5cx-5wr3-5qrc', 'https://github.com/tensorflow/tensorflow/commit/429f009d2b2c09028647dd4bb7b3f6f414bbaad7'...
null
{'https://github.com/tensorflow/tensorflow/commit/429f009d2b2c09028647dd4bb7b3f6f414bbaad7', 'https://github.com/tensorflow/tensorflow/commit/9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad'}
{'https://github.com/tensorflow/tensorflow/commit/429f009d2b2c09028647dd4bb7b3f6f414bbaad7', 'https://github.com/tensorflow/tensorflow/commit/9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad'}
GHSA
GHSA-2p6r-37p9-89p2
Authz Module Non-Determinism
### Impact Consensus failure for 0.43.x and 0.44.{0,1} users. Funds and balances are safe. ### Patches 0.44.2 ### Workarounds Manually patch the code. --- Full details posted in https://forum.cosmos.network/t/cosmos-sdk-vulnerability-retrospective-security-advisory-jackfruit-october-12-2021/5349.
{'CVE-2021-41135'}
2022-04-19T19:03:11Z
2021-10-21T17:46:57Z
MODERATE
6.5
{'CWE-754'}
{'https://forum.cosmos.network/t/cosmos-sdk-vulnerability-retrospective-security-advisory-jackfruit-october-12-2021/5349', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41135', 'https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-2p6r-37p9-89p2', 'https://github.com/cosmos/cosmos-sdk/releases/tag/v0.44.2', 'http...
null
{'https://github.com/cosmos/cosmos-sdk/commit/68ab790a761e80d3674f821794cf18ccbfed45ee'}
{'https://github.com/cosmos/cosmos-sdk/commit/68ab790a761e80d3674f821794cf18ccbfed45ee'}
GHSA
GHSA-r4pj-74mg-8868
Division by 0 in `Conv2DBackpropFilter`
### Impact An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropFilter`: ```python import tensorflow as tf input_tensor = tf.constant([], shape=[0, 0, 1, 0], dtype=tf.float32) filter_sizes = tf.constant([1, 1, 1, 1], shape=[4], dtype=tf.int32) out_backprop = tf.constant([], shape=[0, 0, 1, 1], dtype=t...
{'CVE-2021-29524'}
2021-05-21T14:21:47Z
2021-05-21T14:21:47Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-r4pj-74mg-8868', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29524', 'https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4pj-74mg-8868'}
null
{'https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a'}
{'https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a'}
GHSA
GHSA-98j8-c9q4-r38g
Memory exhaustion in Tensorflow
### Impact The [implementation of `StringNGrams`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161) can be used to trigger a denial of service attack by causing an OOM condition after an integer overflow: ```python import tenso...
{'CVE-2022-21733'}
2022-02-11T17:04:39Z
2022-02-10T00:20:51Z
MODERATE
4.3
{'CWE-400', 'CWE-190'}
{'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161', 'https://github.com/advisories/GHSA-98j8-c9q4-r38g', 'https://nvd.nist.gov/vuln/deta...
null
{'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8'}
{'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8'}
GHSA
GHSA-64rh-r86q-75ff
Hard coded cryptographic key in Kiali
A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configurati...
{'CVE-2020-1764'}
2021-05-18T18:28:59Z
2021-05-18T18:28:59Z
HIGH
8.6
{'CWE-798', 'CWE-321'}
{'https://github.com/advisories/GHSA-64rh-r86q-75ff', 'https://github.com/kiali/kiali/commit/ce48af57113c805a25179aaab1a0fac2fb93653f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1764', 'https://kiali.io/news/security-bulletins/kiali-security-001/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1764', 'https://...
null
{'https://github.com/kiali/kiali/commit/faed1f5f90efae3df9fd6fb793f00ccc242b3a96', 'https://github.com/kiali/kiali/commit/ce48af57113c805a25179aaab1a0fac2fb93653f', 'https://github.com/kiali/kiali/commit/ac7bd6c7ddb2e01356e21d360dd1c718a90706ad', 'https://github.com/kiali/kiali/commit/93f5cd0b6698e8fe8772afb8f35816f6c0...
{'https://github.com/kiali/kiali/commit/ce48af57113c805a25179aaab1a0fac2fb93653f', 'https://github.com/kiali/kiali/commit/faed1f5f90efae3df9fd6fb793f00ccc242b3a96', 'https://github.com/kiali/kiali/commit/93f5cd0b6698e8fe8772afb8f35816f6c086aef1', 'https://github.com/kiali/kiali/commit/ac7bd6c7ddb2e01356e21d360dd1c718a9...
GHSA
GHSA-w5gh-2wr2-pm6g
Denial of Service in Tensorflow
### Impact Changing the TensorFlow's `SavedModel` protocol buffer and altering the name of required keys results in segfaults and data corruption while loading the model. This can cause a denial of service in products using `tensorflow-serving` or other inference-as-a-service installments. We have added fixes to this ...
{'CVE-2020-15206'}
2021-08-26T15:16:58Z
2020-09-25T18:28:40Z
CRITICAL
9
{'CWE-20'}
{'https://github.com/tensorflow/tensorflow/commit/adf095206f25471e864a8e63a0f1caef53a0e3a6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15206', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/ten...
null
{'https://github.com/tensorflow/tensorflow/commit/fcfef195637c6e365577829c4d67681695956e7d', 'https://github.com/tensorflow/tensorflow/commit/adf095206f25471e864a8e63a0f1caef53a0e3a6', 'https://github.com/tensorflow/tensorflow/commit/f760f88b4267d981e13f4b302c437ae800445968'}
{'https://github.com/tensorflow/tensorflow/commit/f760f88b4267d981e13f4b302c437ae800445968', 'https://github.com/tensorflow/tensorflow/commit/fcfef195637c6e365577829c4d67681695956e7d', 'https://github.com/tensorflow/tensorflow/commit/adf095206f25471e864a8e63a0f1caef53a0e3a6'}
GHSA
GHSA-9h4h-8w5p-f28w
Denial of Service in geth
cmd/evm/runner.go in Go Ethereum (aka geth) allows attackers to cause a denial of service (SEGV) via crafted bytecode.
{'CVE-2018-19184'}
2021-06-29T21:23:15Z
2021-06-29T21:23:15Z
HIGH
7.5
{'CWE-476'}
{'https://github.com/ethereum/go-ethereum/commit/83e2761c3a13524bd5d6597ac08994488cf872ef', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19184', 'https://github.com/ethereum/go-ethereum/commit/fb9f7261ec51e38eedb454594fc19f00de1a6834', 'https://github.com/ethereum/go-ethereum/issues/18069', 'https://github.com/advisories...
null
{'https://github.com/ethereum/go-ethereum/commit/83e2761c3a13524bd5d6597ac08994488cf872ef', 'https://github.com/ethereum/go-ethereum/commit/fb9f7261ec51e38eedb454594fc19f00de1a6834'}
{'https://github.com/ethereum/go-ethereum/commit/83e2761c3a13524bd5d6597ac08994488cf872ef', 'https://github.com/ethereum/go-ethereum/commit/fb9f7261ec51e38eedb454594fc19f00de1a6834'}
GHSA
GHSA-c5f8-35qr-q4fm
HTML injection in email and account expiry notifications
### Impact The notification emails sent for notifications for missed messages or for an expiring account are subject to HTML injection. In the case of the notification for missed messages, this could allow an attacker to insert forged content into the email. The account expiry feature is not enabled by default and the...
{'CVE-2021-21333'}
2021-08-31T21:07:09Z
2021-03-26T19:53:04Z
MODERATE
6.1
{'CWE-74'}
{'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df', 'https://github.com/matrix-org/synapse/releases/tag/v1.27.0', 'https://github.com/advisories/GHSA-c5f8-35qr-q4fm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21333', 'https://lists.fedoraproject.org/archives/list/package-announce@...
null
{'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'}
{'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'}
GHSA
GHSA-3hjg-vc7r-rcrw
Denial of Service vulnerability in @podium/layout and @podium/proxy
### Impact An attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that include podlets with proxy endpoints are affected. ### Patches `@podium/layout` which is the main way developers/users are vulnerable to this exploit, has be...
{'CVE-2022-24822'}
2022-04-12T21:50:50Z
2022-04-07T15:20:23Z
HIGH
7.5
{'CWE-248'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24822', 'https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf', 'https://github.com/podium-lib/layout/releases/tag/v4.6.110', 'https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw', 'https://github.com/podium-lib/proxy/rel...
null
{'https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf', 'https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039'}
{'https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039', 'https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf'}
GHSA
GHSA-cx2r-mf6x-55rx
Stored XSS with custom URLs in PrestaShop module ps_linklist
### Impact Stored XSS when using custom URLs. ### Patches The problem is fixed in 3.1.0 ### References [Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html)
{'CVE-2020-5273'}
2021-10-12T16:01:36Z
2021-10-12T16:01:36Z
MODERATE
4.1
{'CWE-79'}
{'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82', 'https://github.com/PrestaShop/ps_linklist/security/advisories/GHSA-cx2r-mf6x-55rx', 'https://github.com/advisories/GHSA-cx2r-mf6x-55rx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5273'}
null
{'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82'}
{'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82'}
GHSA
GHSA-934w-hvj4-7fr6
Path Traversal in jsreport-chrome-pdf
This affects the package jsreport-chrome-pdf before 1.10.0.
{'CVE-2020-7762'}
2021-08-02T15:38:02Z
2021-04-13T15:25:15Z
MODERATE
6.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-934w-hvj4-7fr6', 'https://snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7762', 'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2'}
null
{'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2'}
{'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2'}
GHSA
GHSA-f8mr-jv2c-v8mg
Invalid root may become trusted root in The Update Framework (TUF)
### Impact The Python TUF reference implementation `tuf<0.12` will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a man-in-the-middle attack) culminating in a version wh...
{'CVE-2020-15163'}
2022-04-19T19:02:30Z
2020-09-09T17:29:27Z
HIGH
8.7
{'CWE-863', 'CWE-345'}
{'https://github.com/theupdateframework/tuf/releases/tag/v0.12.0', 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg', 'https://github.com/advisories/GHSA-f8mr-jv2c-v8mg', 'https://pypi.org/project/tuf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15163', 'https://github.com/theupdatefra...
null
{'https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7'}
{'https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7'}
GHSA
GHSA-h563-xh25-x54q
Workflow re-write vulnerability using input parameter
### Impact * Allow end-users to set input parameters, but otherwise expect workflows to be secure. ### Patches Not yet. ### Workarounds * Set `EXPRESSION_TEMPLATES=false` for the workflow controller ### References * https://github.com/argoproj/argo-workflows/issues/6441 ### For more information If you have any...
{'CVE-2021-37914'}
2021-08-30T23:23:12Z
2021-08-09T20:37:50Z
MODERATE
0
{'CWE-20'}
{'https://github.com/argoproj/argo-workflows/security/advisories/GHSA-h563-xh25-x54q', 'https://github.com/advisories/GHSA-h563-xh25-x54q', 'https://github.com/argoproj/argo-workflows/issues/6441', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37914', 'https://github.com/argoproj/argo-workflows/pull/6285', 'https://github...
null
{'https://github.com/argoproj/argo-workflows/commit/2a2ecc916925642fd8cb1efd026588e6828f82e1'}
{'https://github.com/argoproj/argo-workflows/commit/2a2ecc916925642fd8cb1efd026588e6828f82e1'}
GHSA
GHSA-3r3g-g73x-g593
Improper Verification of Cryptographic Signature in coreos
### Impact coreos-installer fails to correctly verify GPG signatures when decompressing gzip-compressed artifacts. This allows bypass of signature verification in cases where coreos-installer decompresses a downloaded OS image, allowing an attacker who can modify the OS image to compromise a newly-installed system. ...
{'CVE-2021-20319'}
2022-04-19T19:03:12Z
2021-10-12T16:06:47Z
HIGH
7.8
{'CWE-347'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=2011862', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20319', 'https://github.com/coreos/coreos-installer/pull/655', 'https://github.com/coreos/coreos-installer/pull/659/commits/ad243c6f0eff2835b2da56ca5f7f33af76253c89', 'https://github.com/advisories/GHSA-3r3g-g73x-g593', '...
null
{'https://github.com/coreos/coreos-installer/pull/659/commits/ad243c6f0eff2835b2da56ca5f7f33af76253c89'}
{'https://github.com/coreos/coreos-installer/pull/659/commits/ad243c6f0eff2835b2da56ca5f7f33af76253c89'}
GHSA
GHSA-rwv7-3v45-hg29
Out-of-bounds Read
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_gray_i. This dates to Pillow 2.4.0.
{'CVE-2021-25288'}
2022-03-03T21:46:05Z
2021-06-08T18:49:28Z
CRITICAL
9.1
{'CWE-125'}
{'https://github.com/advisories/GHSA-rwv7-3v45-hg29', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25288', 'https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470', 'https://secu...
null
{'https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87'}
{'https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87'}
GHSA
GHSA-wp77-4gmm-7cq8
Incorrect validation of `SaveV2` inputs
### Impact The code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference: ```python import tensorflow as tf tf.raw_ops.SaveV2( prefix=['tensorflow'], tensor_name=['v'], shape_and_slices=[], tensors=[1,2,3]) ``` The [implementation](https://git...
{'CVE-2021-37648'}
2021-08-25T14:43:29Z
2021-08-25T14:43:29Z
HIGH
7.8
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37648', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wp77-4gmm-7cq8', 'https://github.com/advisories/GHSA-wp77-4gmm-7cq8', 'https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986'}
null
{'https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986'}
{'https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986'}
GHSA
GHSA-h6fg-mjxg-hqq4
Integer truncation in Shard API usage
### Impact The `Shard` API in TensorFlow expects the last argument to be a function taking two `int64` (i.e., `long long`) arguments: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/util/work_sharder.h#L59-L60 However, there are several places in TensorFlow where ...
{'CVE-2020-15202'}
2021-08-26T15:14:00Z
2020-09-25T18:28:35Z
CRITICAL
9
{'CWE-754', 'CWE-197'}
{'https://github.com/tensorflow/tensorflow/commit/27b417360cbd671ef55915e4bb6bb06af8b8a832', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/advisories/GHSA-h6fg-mjxg-hqq4', 'https://github.com/tensorflow/t...
null
{'https://github.com/tensorflow/tensorflow/commit/ca8c013b5e97b1373b3bb1c97ea655e69f31a575', 'https://github.com/tensorflow/tensorflow/commit/27b417360cbd671ef55915e4bb6bb06af8b8a832'}
{'https://github.com/tensorflow/tensorflow/commit/ca8c013b5e97b1373b3bb1c97ea655e69f31a575', 'https://github.com/tensorflow/tensorflow/commit/27b417360cbd671ef55915e4bb6bb06af8b8a832'}
GHSA
GHSA-pm3v-qxf6-fgxv
Cross-site Scripting in pimcore
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.9.
{'CVE-2022-0285'}
2022-01-27T18:32:20Z
2022-01-21T18:08:43Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0285', 'https://github.com/advisories/GHSA-pm3v-qxf6-fgxv', 'https://huntr.dev/bounties/321918b2-aa01-410e-9f7c-dca5f286bc9c', 'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835'}
null
{'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835'}
{'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835'}
GHSA
GHSA-4vvg-x86p-mvqc
Leaking of user information on Cross-Domain communication in sysend
### Impact Users that use Cross-Origin communication and send sensitive information make it possible for this data to be intercepted. This is not a big impact because it happens only on the same browser. ### Patches It has been patched in version 1.10.0 ### Workarounds The only workaround is to not send sensitive inf...
{'CVE-2022-24762'}
2022-03-28T17:26:42Z
2022-03-14T22:43:23Z
MODERATE
6.5
{'CWE-200'}
{'https://github.com/jcubic/sysend.js/security/advisories/GHSA-4vvg-x86p-mvqc', 'https://github.com/jcubic/sysend.js/issues/33', 'https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24762', 'https://github.com/advisories/GHSA-4vvg-x86p-mvqc', ...
null
{'https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a'}
{'https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a'}
GHSA
GHSA-8vq6-5f66-hp3r
Logic error in dolibarr/dolibarr
In dolibarr/dolibarr prior to 16.0 any low privileged users could update their login name which should only be updated by admin.
{'CVE-2022-0746'}
2022-03-07T13:41:24Z
2022-02-26T00:00:44Z
MODERATE
4.3
null
{'https://huntr.dev/bounties/b812ea22-0c02-46fe-b89f-04519dfb1ebd', 'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0746', 'https://github.com/advisories/GHSA-8vq6-5f66-hp3r'}
null
{'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'}
{'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'}
GHSA
GHSA-9gj3-hwp5-pmwc
XSS in the `altField` option of the Datepicker widget in jquery-ui
### Impact Accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way: ```js $( "#datepicker" ).datepicker( { altField: "<img onerror='doEvilThing()' src='/404' />", } ); ``` will call the `doEvi...
{'CVE-2021-41182'}
2022-04-22T15:40:54Z
2021-10-26T14:55:02Z
MODERATE
6.5
{'CWE-79'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41182', 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/', 'https://git...
null
{'https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63'}
{'https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63'}
GHSA
GHSA-36xw-fx78-c5r4
containerd-shim API Exposed to Host Network Containers
## Impact Access controls for the shim’s API socket verified that the connecting process had an effective UID of 0, but did not otherwise restrict access to the abstract Unix domain socket. This would allow malicious containers running in the same network namespace as the shim, with an effective UID of 0 but otherwise...
{'CVE-2020-15257'}
2022-04-19T19:02:38Z
2021-05-24T17:00:22Z
MODERATE
5.2
{'CWE-669'}
{'https://github.com/containerd/containerd/releases/tag/v1.4.3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15257', 'https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad', 'https://www.debian.org/security/2021/dsa-4865', 'https://security.gentoo.org/glsa/202105-33', 'https://lists.fe...
null
{'https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad'}
{'https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad'}
GHSA
GHSA-wwgf-3xp7-cxj4
Potentially sensitive data exposure in Symfony Web Socket Bundle
### Impact Inside `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()`, messages are arbitrarily broadcasted to the related Topic if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` does not succeed. The `dispatch()` method can be considered to not succeed if (d...
null
2022-04-19T19:02:30Z
2020-07-07T16:33:45Z
MODERATE
5.9
{'CWE-200'}
{'https://snyk.io/vuln/SNYK-PHP-GOSWEBSOCKETBUNDLE-575401', 'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338', 'https://github.com/advisories/GHSA-wwgf-3xp7-cxj4', 'https://github.com/GeniusesOfSymfony/WebSocketBundle/security/advisories/GHSA-wwgf-3xp7-cxj4'}
null
{'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338'}
{'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338'}
GHSA
GHSA-cc2p-4jhr-xhhx
False-positive validity for NFT1 genesis transactions in SLPJS
### Impact In the npm package named "slpjs", versions prior to 0.27.4 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token ty...
{'CVE-2020-15130'}
2021-01-07T23:43:06Z
2020-07-30T14:58:42Z
CRITICAL
7.5
{'CWE-697'}
{'https://github.com/simpleledger/slpjs/security/advisories/GHSA-cc2p-4jhr-xhhx', 'https://github.com/advisories/GHSA-cc2p-4jhr-xhhx', 'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15130'}
null
{'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c'}
{'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c'}
GHSA
GHSA-v9j2-q4q5-cxh4
No CSRF protection on the password change form
### Impact It's possible for forge an URL that, when accessed by an admin, will reset the password of any user in XWiki. ### Patches The problem has been patched in XWiki 12.10.5, 13.2RC1. ### Workarounds It's possible to apply the patch manually by modifying the `register_macros.vm` template like in https://github.c...
{'CVE-2021-32730'}
2021-07-02T19:19:13Z
2021-07-02T19:19:13Z
MODERATE
5.7
{'CWE-352'}
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v9j2-q4q5-cxh4', 'https://jira.xwiki.org/browse/XWIKI-18315', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32730', 'https://github.com/advisories/GHSA-v9j2-q4q5-cxh4', 'https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f725...
null
{'https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257'}
{'https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257'}
GHSA
GHSA-68wm-pfjf-wqp6
Authentication bypassed with malformed request URI on nginx
### Impact This affects uses who are using nginx ngx_http_auth_request_module with Authelia, it allows a malicious individual who crafts a malformed HTTP request to bypass the authentication mechanism. It additionally could theoretically affect other proxy servers, but all of the ones we officially support except nginx...
{'CVE-2021-32637'}
2022-04-19T19:02:58Z
2021-12-20T16:57:16Z
CRITICAL
10
{'CWE-287'}
{'https://github.com/authelia/authelia/commit/c62dbd43d6e69ae81530e7c4f8763857f8ff1dda', 'https://github.com/authelia/authelia/security/advisories/GHSA-68wm-pfjf-wqp6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32637', 'https://github.com/advisories/GHSA-68wm-pfjf-wqp6'}
null
{'https://github.com/authelia/authelia/commit/c62dbd43d6e69ae81530e7c4f8763857f8ff1dda'}
{'https://github.com/authelia/authelia/commit/c62dbd43d6e69ae81530e7c4f8763857f8ff1dda'}