ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-rgvq-pcvf-hx75 | Heap OOB and null pointer dereference in `RaggedTensorToTensor` | ### Impact
Due to lack of validation in `tf.raw_ops.RaggedTensorToTensor`, an attacker can exploit an undefined behavior if input arguments are empty:
```python
import tensorflow as tf
shape = tf.constant([-1, -1], shape=[2], dtype=tf.int64)
values = tf.constant([], shape=[0], dtype=tf.int64)
default_value = tf.const... | {'CVE-2021-29608'} | 2021-05-21T14:28:27Z | 2021-05-21T14:28:27Z | MODERATE | 5.3 | {'CWE-131'} | {'https://github.com/tensorflow/tensorflow/commit/b761c9b652af2107cfbc33efd19be0ce41daa33e', 'https://github.com/tensorflow/tensorflow/commit/c4d7afb6a5986b04505aca4466ae1951686c80f6', 'https://github.com/advisories/GHSA-rgvq-pcvf-hx75', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rgvq-pcvf-hx75'... | null | {'https://github.com/tensorflow/tensorflow/commit/b761c9b652af2107cfbc33efd19be0ce41daa33e', 'https://github.com/tensorflow/tensorflow/commit/c4d7afb6a5986b04505aca4466ae1951686c80f6', 'https://github.com/tensorflow/tensorflow/commit/f94ef358bb3e91d517446454edff6535bcfe8e4a'} | {'https://github.com/tensorflow/tensorflow/commit/c4d7afb6a5986b04505aca4466ae1951686c80f6', 'https://github.com/tensorflow/tensorflow/commit/b761c9b652af2107cfbc33efd19be0ce41daa33e', 'https://github.com/tensorflow/tensorflow/commit/f94ef358bb3e91d517446454edff6535bcfe8e4a'} |
GHSA | GHSA-77gp-3h4r-6428 | Out of bounds read and write in Tensorflow | ### Impact
There is a typo in TensorFlow's [`SpecializeType`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102) which results in heap OOB read/write:
```cc
for (int i = 0; i < op_def.output_arg_size(); i++) {
// ...
for (int... | {'CVE-2022-23574'} | 2022-02-11T20:46:43Z | 2022-02-09T23:25:40Z | HIGH | 8.8 | {'CWE-787', 'CWE-125'} | {'https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-77gp-3h4r-6428', ... | null | {'https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042'} | {'https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042'} |
GHSA | GHSA-7322-jrq4-x5hf | File reference keys leads to incorrect hashes on HMAC algorithms | ### Impact
Users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents.
The HMAC hashing functions take any string as input and, since users can issue an... | {'CVE-2021-41106'} | 2022-04-19T19:03:10Z | 2021-09-29T17:09:40Z | MODERATE | 4.4 | {'CWE-345'} | {'https://github.com/advisories/GHSA-7322-jrq4-x5hf', 'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41106'} | null | {'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'} | {'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'} |
GHSA | GHSA-8fp4-rp6c-5gcv | Path Traversal in com.linecorp.armeria:armeria | ### Impact
An attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic.
### Patches
Armeria 1.13.4 or above contains the hardened path vali... | {'CVE-2021-43795'} | 2021-12-03T15:15:09Z | 2021-12-02T22:25:54Z | HIGH | 7.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43795', 'https://github.com/line/armeria/pull/3855', 'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284', 'https://github.com/line/armeria/security/advisories/GHSA-8fp4-rp6c-5gcv', 'https://github.com/advisories/GHSA-8fp4-rp6c-5gcv'} | null | {'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284'} | {'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284'} |
GHSA | GHSA-9vwf-54m9-gc4f | snipe-it is vulnerable to Improper Access Control | snipe-it is vulnerable to Improper Access Control | {'CVE-2021-4089'} | 2021-12-16T14:32:39Z | 2021-12-16T14:32:39Z | MODERATE | 4.3 | {'CWE-863', 'CWE-284'} | {'https://github.com/advisories/GHSA-9vwf-54m9-gc4f', 'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24', 'https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4089'} | null | {'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'} | {'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'} |
GHSA | GHSA-rphc-h572-2x9f | Cross-site Scripting in showdoc/showdoc | ShowDoc is a tool greatly applicable for an IT team to share documents online. showdoc/showdoc allows .properties files to upload which lead to stored XSS in versions prior to 2.10.4. This allows attackers to execute malicious scripts in the user's browser. This issue was patched in version 2.10.4. There is currently n... | {'CVE-2022-0960'} | 2022-03-24T22:38:55Z | 2022-03-15T00:00:55Z | CRITICAL | 9 | {'CWE-434', 'CWE-79'} | {'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f', 'https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0960', 'https://github.com/advisories/GHSA-rphc-h572-2x9f'} | null | {'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'} | {'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'} |
GHSA | GHSA-wwgq-9jhf-qgw6 | Cross-Site Request Forgery allowing sending of test emails and generation of node auto-deployment keys | ### Impact
Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints:
* Sending a test email.
* Generating a node auto-deployment token.
At no point would any data be exposed to the malicious user, this would simply trigger email sp... | {'CVE-2021-41273'} | 2022-04-19T19:03:15Z | 2021-11-18T15:46:57Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/advisories/GHSA-wwgq-9jhf-qgw6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41273', 'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-wwgq-9jhf-qgw6'} | null | {'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'} | {'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'} |
GHSA | GHSA-58r4-h6v8-jcvm | Regression in JWT Signature Validation | ### Overview
Versions after and including `2.3.0` are improperly validating the JWT token signature when using the `JWTValidator.verify` method. Improper validation of the JWT token signature when not using the default Authorization Code Flow can allow an attacker to bypass authentication and authorization.
### Am I ... | {'CVE-2020-15240'} | 2021-11-19T14:41:31Z | 2020-11-03T02:31:38Z | HIGH | 7.4 | {'CWE-287', 'CWE-347'} | {'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a', 'https://rubygems.org/gems/omniauth-auth0', 'https://github.com/advisories/GHSA-58r4-h6v8-jcvm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15240', 'https://github.com/auth0/omniauth-auth0/security/advisories/GHSA-58r4-h6v8-jcvm... | null | {'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a'} | {'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a'} |
GHSA | GHSA-7r28-3m3f-r2pr | Regular Expression Denial of Service (ReDoS) | The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time. | {'CVE-2021-28092'} | 2021-05-14T17:09:26Z | 2021-03-19T21:25:50Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/advisories/GHSA-7r28-3m3f-r2pr', 'https://github.com/sindresorhus/is-svg/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28092', 'https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2', 'https://www.npmjs.com/package/is-svg', 'https://security.netapp.com/advisory/ntap-20210513-0008/', 'h... | null | {'https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b'} | {'https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b'} |
GHSA | GHSA-pp7m-6j83-m7r6 | Cross-site Scripting in video.js | This affects the package video.js before 7.14.3.
The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.
| {'CVE-2021-23414'} | 2021-08-31T21:01:29Z | 2021-08-10T16:09:36Z | MODERATE | 6.5 | {'CWE-79'} | {'https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23414', 'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587', 'https://github.com/advisories/GHSA-pp7m-6j83-m7r6', 'https://snyk.io/vuln/SN... | null | {'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2'} | {'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2'} |
GHSA | GHSA-vfr4-x8j2-3rf9 | Division by zero in TFLite's implementation of `TransposeConv` | ### Impact
The optimized implementation of the `TransposeConv` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L5221-L5222):
```cc
int height_col = (height + pa... | {'CVE-2021-29588'} | 2021-05-21T14:26:48Z | 2021-05-21T14:26:48Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vfr4-x8j2-3rf9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29588', 'https://github.com/advisories/GHSA-vfr4-x8j2-3rf9'} | null | {'https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d'} | {'https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d'} |
GHSA | GHSA-pjxv-w3qj-j8m3 | Directory Traversal in elFinder.AspNet | This affects the package elFinder.AspNet before 1.1.1.
The user-controlled file name is not properly sanitized before it is used to create a file system path.
| {'CVE-2021-23415'} | 2021-08-31T21:00:59Z | 2021-08-09T20:42:13Z | HIGH | 7.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23415', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153', 'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720', 'https://github.com/advisories/GHSA-pjxv-w3qj-j8m3'} | null | {'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720'} | {'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720'} |
GHSA | GHSA-8m49-2xj8-67v9 | Data Loss/Denial of Service in SWHKD | SWHKD 1.1.5 unsafely uses the /tmp/swhks.pid pathname. There can be data loss or a denial of service. A patch is available on the `1.1.0` branch of the repository. | {'CVE-2022-27816'} | 2022-04-28T18:02:04Z | 2022-03-31T00:00:24Z | HIGH | 7.1 | {'CWE-59'} | {'https://github.com/waycrate/swhkd/commit/0b620a09605afb815c6d8d8953bbb7a10a8c0575', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27816', 'https://github.com/advisories/GHSA-8m49-2xj8-67v9', 'http://www.openwall.com/lists/oss-security/2022/04/14/1'} | null | {'https://github.com/waycrate/swhkd/commit/0b620a09605afb815c6d8d8953bbb7a10a8c0575'} | {'https://github.com/waycrate/swhkd/commit/0b620a09605afb815c6d8d8953bbb7a10a8c0575'} |
GHSA | GHSA-fcqf-h4h4-695m | Moderate severity vulnerability that affects actionpack | CRLF injection vulnerability in actionpack/lib/action_controller/response.rb in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header. | {'CVE-2011-3186'} | 2021-09-10T17:32:18Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2011-3186', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9', 'http://secunia.com/advisories/45921', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html', ... | null | {'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9'} | {'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9'} |
GHSA | GHSA-rf54-44jr-q5vf | Improper Input Validation in url-js | The package url-js before 2.1.0 is vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is. | {'CVE-2022-25839'} | 2022-03-28T22:33:08Z | 2022-03-12T00:00:26Z | MODERATE | 5.3 | {'CWE-20'} | {'https://github.com/advisories/GHSA-rf54-44jr-q5vf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25839', 'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0', 'https://snyk.io/vuln/SNYK-JS-URLJS-2414030'} | null | {'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0'} | {'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0'} |
GHSA | GHSA-gpfh-jvf9-7wg5 | Use after free / memory leak in `CollectiveReduceV2` | ### Impact
The [async implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/collective_ops.cc#L604-L615) of `CollectiveReduceV2` suffers from a memory leak and a use after free:
```python
import tensorflow as tf
tf.raw_ops.CollectiveReduceV2(
... | {'CVE-2021-41220'} | 2021-11-10T18:51:21Z | 2021-11-10T18:51:21Z | HIGH | 7.8 | {'CWE-416'} | {'https://github.com/advisories/GHSA-gpfh-jvf9-7wg5', 'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41220', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gpfh-jvf9-7wg5'} | null | {'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75'} | {'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75'} |
GHSA | GHSA-wc7v-77jr-5c3m | bookstack is vulnerable to Cross-Site Request Forgery (CSRF) | bookstack is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-3944'} | 2021-12-03T20:38:37Z | 2021-12-03T20:38:37Z | LOW | 3.1 | {'CWE-352'} | {'https://github.com/advisories/GHSA-wc7v-77jr-5c3m', 'https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9', 'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3944'} | null | {'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'} | {'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'} |
GHSA | GHSA-4vhj-98r6-424h | In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the signature and still have it validate | In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed... | {'CVE-2016-1000338'} | 2022-04-27T13:26:49Z | 2018-10-17T16:23:26Z | HIGH | 7.5 | {'CWE-347'} | {'https://github.com/advisories/GHSA-4vhj-98r6-424h', 'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://nvd.... | null | {'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0'} | {'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0'} |
GHSA | GHSA-vwxp-9qmf-w299 | Cross-site Scripting in LiveHelperChat | LiveHelperChat (remdex/livehelperchat in Packagist) has a stored Cross-site Scripting (XSS) vulnerability prior to version 3.93. | {'CVE-2022-0394'} | 2022-02-03T19:18:03Z | 2022-02-01T00:49:48Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0394', 'https://github.com/advisories/GHSA-vwxp-9qmf-w299', 'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3', 'https://huntr.dev/bounties/e13823d0-271c-448b-a0c5-8549ea7ea272'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'} | {'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'} |
GHSA | GHSA-grpf-gg7v-5g5h | SQL Injection in Apache SkyWalking | Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases. | {'CVE-2020-13921'} | 2021-05-07T15:53:31Z | 2021-05-07T15:53:31Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://github.com/advisories/GHSA-grpf-gg7v-5g5h', 'https://github.com/apache/skywalking/pull/4970', 'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951', 'http://www.openwall.com/lists/oss-security/2020/08/05/3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13921', 'https://lists.apa... | null | {'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951'} | {'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951'} |
GHSA | GHSA-rf3h-xgv5-2q39 | Division by zero in TFLite's implementation of `DepthwiseConv` | ### Impact
The implementation of the `DepthwiseConv` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/depthwise_conv.cc#L287-L288):
```cc
int num_input_channels = SizeOfDimension(input, 3);
TF_LITE... | {'CVE-2021-29602'} | 2021-05-21T14:28:12Z | 2021-05-21T14:28:12Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rf3h-xgv5-2q39', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29602', 'https://github.com/advisories/GHSA-rf3h-xgv5-2q39', 'https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0'} | null | {'https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0'} | {'https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0'} |
GHSA | GHSA-rfq3-w54c-f9q5 | OAuth2 Redirect URL validity does not respect query parameters and character casing for loopback addresses | ### Impact
[fosite#400](https://github.com/ory/fosite/pull/400) (released as v0.30.2) introduced a new feature for handling redirect URLs pointing to loopback interfaces ([rfc8252#section-7.3](https://tools.ietf.org/html/rfc8252#section-7.3)). As part of that change new behavior was introduced which failed to respect ... | {'CVE-2020-15233'} | 2022-04-19T19:02:35Z | 2021-05-24T17:00:12Z | MODERATE | 5.5 | {'CWE-20', 'CWE-601'} | {'https://github.com/ory/fosite/pull/400', 'https://github.com/advisories/GHSA-rfq3-w54c-f9q5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15233', 'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf', 'https://github.com/ory/fosite/security/advisories/GHSA-rfq3-w54c-f9q5'} | null | {'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf'} | {'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf'} |
GHSA | GHSA-rfjc-xrmf-5vvw | Privilege escalation by backend users assigned to the default "Publisher" system role | ### Impact
Backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access.
### Patches
Issue has been patched in Build 470 (v1.0... | {'CVE-2020-15248'} | 2022-04-19T19:02:37Z | 2020-11-23T19:47:27Z | LOW | 4 | {'CWE-863', 'CWE-269'} | {'https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829', 'https://github.com/advisories/GHSA-rfjc-xrmf-5vvw', 'https:... | null | {'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982'} | {'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829'} |
GHSA | GHSA-x9p2-fxq6-2m5f | Reverse Tabnapping in swagger-ui | Versions of `swagger-ui` prior to 3.18.0 are vulnerable to [Reverse Tabnapping](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page. This is commonly used for phishing attacks.
## Recommendation
Upg... | null | 2021-08-16T23:44:48Z | 2019-06-20T14:33:07Z | MODERATE | 4.3 | {'CWE-1022'} | {'https://github.com/swagger-api/swagger-ui/pull/4789', 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449808', 'https://github.com/advisories/GHSA-x9p2-fxq6-2m5f', 'https://github.com/swagger-api/swagger-ui/releases/tag/v3.18.0', 'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf', 'ht... | null | {'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf'} | {'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf'} |
GHSA | GHSA-rqjq-mrgx-85hp | Allocation of Resources Without Limits or Throttling in Hashicorp Consul | HashiCorp Consul and Consul Enterprise include an HTTP API (introduced in 1.2.0) and DNS (introduced in 1.4.3) caching feature that was vulnerable to denial of service. Fixed in 1.6.6 and 1.7.4. | {'CVE-2020-13250'} | 2021-07-29T18:19:35Z | 2021-05-18T18:21:35Z | HIGH | 7.5 | {'CWE-770'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13250', 'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/pull/8023', 'https://github.com/hashicorp/consul/commit/72f92ae7ca4cabc1dc3069362a9b64ef46941432', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md', 'htt... | null | {'https://github.com/hashicorp/consul/commit/72f92ae7ca4cabc1dc3069362a9b64ef46941432'} | {'https://github.com/hashicorp/consul/commit/72f92ae7ca4cabc1dc3069362a9b64ef46941432'} |
GHSA | GHSA-xp5q-77mh-6hm2 | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-3728'} | 2021-08-25T14:50:17Z | 2021-08-25T14:50:17Z | MODERATE | 6.5 | {'CWE-352'} | {'https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d', 'https://github.com/advisories/GHSA-xp5q-77mh-6hm2', 'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3728'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e'} | {'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e'} |
GHSA | GHSA-jrfj-98qg-qjgv | Denial of service in sidekiq | In api.rb in Sidekiq before 6.4.0 and 5.2.10, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users. | {'CVE-2022-23837'} | 2022-03-11T20:13:54Z | 2022-01-27T14:42:37Z | HIGH | 7.5 | {'CWE-400', 'CWE-770'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23837', 'https://github.com/rubysec/ruby-advisory-db/pull/495', 'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html', 'https://github.com/TUTUMSPACE/exploits/blob/main/sideki... | null | {'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956'} | {'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956'} |
GHSA | GHSA-3wwj-wh2w-g4xp | CRLF Injection in microweber | CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0666'} | 2022-02-26T01:14:30Z | 2022-02-19T00:01:35Z | HIGH | 7.6 | {'CWE-93'} | {'https://github.com/advisories/GHSA-3wwj-wh2w-g4xp', 'https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55', 'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0666'} | null | {'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'} | {'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'} |
GHSA | GHSA-4952-p58q-6crx | JupyterLab: XSS due to lack of sanitization of the action attribute of an html <form> | ### Impact
Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook.
### Patches
Patched in the following versions: 3.1.4, 3.0.17, 2.3.2, 2.2.10, 1.2.21.
### References
[OWASP Page on Restricting Form Submissions](https://cheatsheetseries.owasp.org/c... | {'CVE-2021-32797'} | 2022-04-08T21:47:11Z | 2021-08-23T19:40:22Z | HIGH | 7.4 | {'CWE-87', 'CWE-79', 'CWE-75'} | {'https://github.com/advisories/GHSA-4952-p58q-6crx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32797', 'https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx', 'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed', 'https://github.com/google/security-res... | null | {'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed'} | {'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed'} |
GHSA | GHSA-4p92-fv6v-fhfj | Cross-site Scripting in microweber | Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting. | {'CVE-2022-0723'} | 2022-03-09T20:43:45Z | 2022-02-27T00:00:15Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-4p92-fv6v-fhfj', 'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5', 'https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0723'} | null | {'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'} | {'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'} |
GHSA | GHSA-jcpv-g9rr-qxrc | Regular Expression Denial of Service in hawk | Versions of `hawk` prior to 3.1.3, or 4.x prior to 4.1.1 are affected by a regular expression denial of service vulnerability related to excessively long headers and URI's.
## Recommendation
Update to hawk version 4.1.1 or later. | {'CVE-2016-2515'} | 2021-09-14T19:39:20Z | 2018-07-31T22:52:00Z | HIGH | 7.5 | null | {'https://github.com/advisories/GHSA-jcpv-g9rr-qxrc', 'https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa', 'https://bugzilla.redhat.com/show_bug.cgi?id=1309721', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2515', 'https://nodesecurity.io/advisories/77', 'https://github.com/hueniverse/haw... | null | {'https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa'} | {'https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa'} |
GHSA | GHSA-ch68-7cf4-35vr | Limited ability to spoof SAML authentication with missing audience verification in Fleet | ### Impact
This impacts deployments using SAML SSO in two specific cases:
1. A malicious or compromised Service Provider (SP) could reuse the SAML response to log into Fleet as a user -- only if the user has an account with the same email in Fleet, _and_ the user signs into the malicious SP via SAML SSO from the same... | {'CVE-2022-23600'} | 2022-04-19T19:03:21Z | 2022-02-07T21:57:38Z | MODERATE | 5.3 | {'CWE-287', 'CWE-284'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23600', 'https://github.com/fleetdm/fleet/security/advisories/GHSA-ch68-7cf4-35vr', 'https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374', 'https://github.com/advisories/GHSA-ch68-7cf4-35vr'} | null | {'https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374'} | {'https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374'} |
GHSA | GHSA-xqxm-2rpm-3889 | Comment reply notifications sent to incorrect users | ### Impact
When notifications for new replies in comment threads are sent, they are sent to all users who have replied or commented anywhere on the site, rather than only in the relevant threads. This means that a user could listen in to new comment replies on pages they have not had editing access to, as long as they ... | {'CVE-2022-21683'} | 2022-04-19T19:03:19Z | 2022-01-21T23:43:50Z | LOW | 3.5 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21683', 'https://github.com/wagtail/wagtail/releases/tag/v2.15.2', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-xqxm-2rpm-3889', 'https://github.com/advisories/GHSA-xqxm-2rpm-3889', 'https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a8975829512... | null | {'https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a897582951266afd'} | {'https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a897582951266afd'} |
GHSA | GHSA-6rv4-4qv6-88g2 | Prototype Pollution in set-or-get | Prototype pollution vulnerability in ‘set-or-get’ version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2021-25913'} | 2021-04-12T17:39:19Z | 2021-04-12T17:39:19Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25913', 'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936', 'https://github.com/advisories/GHSA-6rv4-4qv6-88g2', 'https://www.npmjs.com/package/set-or-get'... | null | {'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936'} | {'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936'} |
GHSA | GHSA-84g3-cv89-m9gm | Prototype pollution vulnerability in 'patchmerge' | Prototype pollution vulnerability in 'patchmerge' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2021-25916'} | 2021-10-13T15:33:20Z | 2021-10-13T15:33:20Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916', 'https://github.com/advisories/GHSA-84g3-cv89-m9gm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25916'} | null | {'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12'} | {'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12'} |
GHSA | GHSA-c265-37vj-cwcc | Deserialization of untrusted data in Jackson Databind | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2). | {'CVE-2020-14062'} | 2021-10-21T21:08:02Z | 2020-06-18T14:44:48Z | HIGH | 8.1 | {'CWE-502'} | {'https://github.com/FasterXML/jackson-databind/issues/2704', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14062', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://snyk.io/vuln/SNYK-JAVA... | null | {'https://github.com/FasterXML/jackson-databind/commit/99001cdb6807b5c7b170ec6a9092ecbb618ae79c'} | {'https://github.com/FasterXML/jackson-databind/commit/99001cdb6807b5c7b170ec6a9092ecbb618ae79c'} |
GHSA | GHSA-7v94-64hj-m82h | FPE in `ParallelConcat` | ### Impact
The [implementation of `ParallelConcat`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/inplace_ops.cc#L72-L97) misses some input validation and can produce a division by 0:
```python
import tensorflow as tf
@tf.function
def test():
y = tf.r... | {'CVE-2021-41207'} | 2021-11-10T19:02:57Z | 2021-11-10T19:02:57Z | MODERATE | 5.5 | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41207', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7v94-64hj-m82h', 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235', 'https://github.com/advisories/GHSA-7v94-64hj-m82h'} | null | {'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'} | {'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'} |
GHSA | GHSA-pgcr-7wm4-mcv6 | Sensitive Data Exposure in pem | Versions of `pem` before 1.13.2 expose sensitive data when the `readPkcs12` is used.
The `readPkcs12` function reads the certificate and key data from a pkcs12 file using the encryption password. As part of this process it creates a globally readable file with a filename of 20 random 0-f characters in the temporary d... | null | 2021-08-04T21:28:02Z | 2019-06-04T15:42:45Z | CRITICAL | 7.5 | {'CWE-200'} | {'https://snyk.io/vuln/SNYK-JS-PEM-173687', 'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb', 'https://github.com/advisories/GHSA-pgcr-7wm4-mcv6', 'https://github.com/Dexus/pem/pull/217', 'https://www.npmjs.com/advisories/723'} | null | {'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb'} | {'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb'} |
GHSA | GHSA-7vxr-6cxg-j3x8 | OS Command Injection in ftpd | The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic. | {'CVE-2013-2512'} | 2021-10-12T22:33:59Z | 2021-10-12T22:33:59Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c', 'http://vapidlabs.com/advisory.php?v=34', 'https://github.com/advisories/GHSA-7vxr-6cxg-j3x8', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2512'} | null | {'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c'} | {'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c'} |
GHSA | GHSA-v2wc-pfq2-5cm6 | Possible XSS attack in Wagtail | ### Impact
A cross-site scripting (XSS) vulnerability exists on the page revision comparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform ac... | {'CVE-2020-11001'} | 2022-04-19T19:02:25Z | 2020-04-14T23:09:29Z | MODERATE | 5.8 | {'CWE-80'} | {'https://github.com/wagtail/wagtail/releases/tag/v2.8.1', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-v2wc-pfq2-5cm6', 'https://github.com/advisories/GHSA-v2wc-pfq2-5cm6', 'https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1... | null | {'https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389'} | {'https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389'} |
GHSA | GHSA-hwvm-vfw8-93mw | Vulnerable dependency in XTDB connector | ### Impact
The impacted portion of the XTDB connector is its connectivity to S3 as a backing store: this is the only portion of the connector that uses this vulnerable `httpclient` dependency. Per the description, the vulnerability regards URIs that may be misinterpreted, which given the area of impact within the conn... | null | 2021-12-16T18:53:32Z | 2021-12-16T18:53:32Z | MODERATE | 5.3 | null | {'https://github.com/odpi/egeria-connector-xtdb/security/advisories/GHSA-hwvm-vfw8-93mw', 'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15', 'https://github.com/advisories/GHSA-hwvm-vfw8-93mw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956'} | null | {'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15'} | {'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15'} |
GHSA | GHSA-828x-qc2p-wprq | Undefined behavior in `MaxPool3DGradGrad` | ### Impact
The implementation of `tf.raw_ops.MaxPool3DGradGrad` exhibits undefined behavior by dereferencing null pointers backing attacker-supplied empty tensors:
```python
import tensorflow as tf
orig_input = tf.constant([0.0], shape=[1, 1, 1, 1, 1], dtype=tf.float32)
orig_output = tf.constant([0.0], shape=[1, 1, 1... | {'CVE-2021-29574'} | 2021-05-21T14:26:10Z | 2021-05-21T14:26:10Z | LOW | 2.5 | {'CWE-476'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29574', 'https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4', 'https://github.com/advisories/GHSA-828x-qc2p-wprq', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-828x-qc2p-wprq'} | null | {'https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4'} | {'https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4'} |
GHSA | GHSA-j5qg-w9jg-3wg3 | Inability to de-op players if listed in ops.txt with non-lowercase letters | ### Impact
Originally reported in iTXTech/Genisys#1188
```txt
PotterHarry98
potterharry98
```
`deop PotterHarry98`
will remove `potterharry98` from the ops.txt but not `PotterHarry98`.
Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match:
https://github.com/p... | null | 2022-04-19T19:03:17Z | 2021-12-16T18:53:57Z | LOW | 3.3 | null | {'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403', 'https://github.com/iTXTech/Genisys/issues/1188', 'https://github.com/advis... | null | {'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'} | {'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'} |
GHSA | GHSA-5gm3-px64-rw72 | Uncontrolled Resource Consumption in Pillow | There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python th... | {'CVE-2019-19911'} | 2021-08-23T15:06:45Z | 2020-04-01T16:36:44Z | HIGH | 7.5 | {'CWE-190'} | {'https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d', 'https://github.com/advisories/GHSA-5gm3-px64-rw72', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19911', 'https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02', 'https://www.debian.org/security/2020/dsa-... | null | {'https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d'} | {'https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d'} |
GHSA | GHSA-j5rj-g695-342r | Moderate severity vulnerability that affects fat_free_crm | FatFreeCRM version <=0.14.1, >=0.15.0 <=0.15.1, >=0.16.0 <=0.16.3, >=0.17.0 <=0.17.2, ==0.18.0 contains a Cross Site Scripting (XSS) vulnerability in commit 6d60bc8ed010c4eda05d6645c64849f415f68d65 that can result in Javascript execution. This attack appear to be exploitable via Content with Javascript payload will be ... | {'CVE-2018-1000842'} | 2021-09-14T18:25:50Z | 2018-12-20T22:01:54Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000842', 'https://groups.google.com/forum/#!topic/fat-free-crm-users/TxsdZXSe7Jc', 'https://github.com/advisories/GHSA-j5rj-g695-342r', 'https://github.com/asteinhauser/fat_free_c... | null | {'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa'} | {'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa'} |
GHSA | GHSA-9236-8w7q-rmrv | archivy is vulnerable to Cross-Site Request Forgery (CSRF) | archivy is vulnerable to Cross-Site Request Forgery (CSRF). There is [a fix](https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d) available in the master branch. | {'CVE-2021-4162'} | 2022-01-06T21:59:50Z | 2022-01-06T21:59:50Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d', 'https://huntr.dev/bounties/e204a768-2129-4b6f-abad-e436309c7c32', 'https://github.com/advisories/GHSA-9236-8w7q-rmrv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4162'} | null | {'https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d'} | {'https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d'} |
GHSA | GHSA-6g88-vr3v-76mf | Eval injection in Supybot/Limnoria | Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands. | {'CVE-2019-19010'} | 2021-08-18T22:35:12Z | 2019-11-20T01:31:31Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://github.com/ProgVal/Limnoria/commit/3848ae78de45b35c029cc333963d436b9d2f0a35', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5P2AGND54UIJV3WHOYO2YINIXSDGAAPO/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19010', 'https://lists.fedoraproject.org/archives/list/pa... | null | {'https://github.com/ProgVal/Limnoria/commit/3848ae78de45b35c029cc333963d436b9d2f0a35'} | {'https://github.com/ProgVal/Limnoria/commit/3848ae78de45b35c029cc333963d436b9d2f0a35'} |
GHSA | GHSA-2hjr-fg6c-v2h6 | Unauthorized access to Class instance in Jinjava | Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure. | {'CVE-2020-12668'} | 2022-02-09T00:33:56Z | 2022-02-09T00:33:56Z | MODERATE | 6.5 | {'CWE-200'} | {'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b', 'https://github.com/HubSpot/jinjava/compare/jinjava-2.5.3...jinjava-2.5.4', 'https://securitylab.github.com/advisories/GHSL-2020-072-hubspot_jinjava', 'https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.5.4', 'https:... | null | {'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b', 'https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165'} | {'https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165', 'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b'} |
GHSA | GHSA-cxm3-v4mv-6mh8 | Cross-site Scripting in vditor | vditor does not filter user input | {'CVE-2021-4103'} | 2022-01-28T22:04:11Z | 2022-01-28T22:04:11Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d', 'https://github.com/advisories/GHSA-cxm3-v4mv-6mh8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4103', 'https://huntr.dev/bounties/67b980af-7357-4879-9448-a926c6474225', 'https://github.com/Vanessa219/vditor/issues/1133'} | null | {'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d'} | {'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d'} |
GHSA | GHSA-g67g-hvc3-xmvf | Inconsistent input sanitisation leads to XSS vectors | ### Background
A variety of templates do not perform proper sanitization through HTML escaping.
Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of XSS possibilities with specially crafted input to a variety of fields.
### Impact
OMERO.web before 5.11.0 and OMERO.figure before 4.4... | {'CVE-2021-41132'} | 2022-03-22T21:24:34Z | 2021-10-14T21:19:23Z | CRITICAL | 9.8 | {'CWE-116', 'CWE-79'} | {'https://github.com/ome/omero-web/security/advisories/GHSA-g67g-hvc3-xmvf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41132', 'https://www.openmicroscopy.org/security/advisories/2021-SV3/', 'https://github.com/advisories/GHSA-g67g-hvc3-xmvf', 'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae9... | null | {'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424'} | {'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424'} |
GHSA | GHSA-qv7g-j98v-8pp7 | XSS vulnerability on email template preview page | ### Summary
Email template preview is vulnerable to XSS payload added to email template content. The attacker should have permission to create or edit an email template. For successful payload, execution attacked user should preview a vulnerable email template.
### Workarounds
There are no workarounds that address t... | {'CVE-2021-41236'} | 2022-01-06T19:49:02Z | 2022-01-06T18:34:35Z | MODERATE | 6.9 | {'CWE-79'} | {'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a', 'https://github.com/advisories/GHSA-qv7g-j98v-8pp7', 'https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41236'} | null | {'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'} | {'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'} |
GHSA | GHSA-w29m-fjp4-qhmq | Unsafe Identifiers in Opencast | ### Impact
Opencast allows almost arbitrary identifiers for media packages and
elements to be used. This can be problematic for operation and security
since such identifiers are sometimes used for file system operations
which may lead to an attacker being able to escape working directories and
write files to other loc... | {'CVE-2020-5230'} | 2021-01-14T17:45:48Z | 2020-01-30T21:21:50Z | MODERATE | 7.7 | {'CWE-99'} | {'https://github.com/advisories/GHSA-w29m-fjp4-qhmq', 'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317', 'https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5230'} | null | {'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317'} | {'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317'} |
GHSA | GHSA-2v6x-frw8-7r7f | Exposure of Sensitive Information to an Unauthorized Actor in kube-state-metrics | A security issue was discovered in kube-state-metrics 1.7.x before 1.7.2. An experimental feature was added to v1.7.0 and v1.7.1 that enabled annotations to be exposed as metrics. By default, kube-state-metrics metrics only expose metadata about Secrets. However, a combination of the default kubectl behavior and this n... | {'CVE-2019-17110'} | 2021-05-18T15:38:54Z | 2021-05-18T15:38:54Z | MODERATE | 6.5 | {'CWE-200'} | {'https://github.com/kubernetes/kube-state-metrics/commit/2a9ab3a9a0f1c4dbecb6a5577185b33bfac86a96', 'https://github.com/kubernetes/kube-state-metrics/releases/tag/v1.7.2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17110', 'https://github.com/advisories/GHSA-2v6x-frw8-7r7f', 'https://github.com/kubernetes/kube-state-m... | null | {'https://github.com/kubernetes/kube-state-metrics/commit/2a9ab3a9a0f1c4dbecb6a5577185b33bfac86a96', 'https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f'} | {'https://github.com/kubernetes/kube-state-metrics/commit/2a9ab3a9a0f1c4dbecb6a5577185b33bfac86a96', 'https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f'} |
GHSA | GHSA-q8q8-93cv-v6h8 | Lookup function information discolosure in helm | The Helm core maintainers have identified an information disclosure vulnerability in Helm 3.0.0-3.1.2.
### Impact
`lookup` is a Helm template function introduced in Helm v3. It is able to lookup resources in the cluster to check for the existence of specific resources and get details about them. This can be used as ... | {'CVE-2020-11013'} | 2021-05-27T18:44:56Z | 2021-05-27T18:44:56Z | HIGH | 8.5 | {'CWE-200'} | {'https://github.com/helm/helm/releases/tag/v3.2.0', 'https://github.com/helm/helm/pull/7969', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11013', 'https://github.com/helm/helm/pull/7969/commits/c67b644a791a8fa61c760a3a0474533e63e74008', 'https://github.com/helm/helm/security/advisories/GHSA-q8q8-93cv-v6h8', 'https://gi... | null | {'https://github.com/helm/helm/pull/7969/commits/c67b644a791a8fa61c760a3a0474533e63e74008'} | {'https://github.com/helm/helm/pull/7969/commits/c67b644a791a8fa61c760a3a0474533e63e74008'} |
GHSA | GHSA-xr38-w74q-r8jv | Permissions not properly checked in Invenio-Drafts-Resources | ### Impact
Invenio-Drafts-Resources does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validat... | {'CVE-2021-43781'} | 2022-04-19T19:03:16Z | 2021-12-06T23:57:59Z | MODERATE | 6.4 | {'CWE-862'} | {'https://github.com/inveniosoftware/invenio-drafts-resources/security/advisories/GHSA-xr38-w74q-r8jv', 'https://github.com/advisories/GHSA-xr38-w74q-r8jv', 'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43781'} | null | {'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626'} | {'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626'} |
GHSA | GHSA-4j82-5ccr-4r8v | `CHECK`-failures in `TensorByteSize` in Tensorflow | ### Impact
A malicious user can cause a denial of service by altering a `SavedModel` such that [`TensorByteSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.cc#L46-L50) would trigger `CHECK` failures.
```cc
int64_t TensorByteSize(con... | {'CVE-2022-23582'} | 2022-02-11T20:38:32Z | 2022-02-10T00:34:01Z | MODERATE | 6.5 | {'CWE-617'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23582', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4j82-5ccr-4r8v', 'https://github.com/advisories/GHSA-4j82-5ccr-4r8v', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.c... | null | {'https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02'} | {'https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02'} |
GHSA | GHSA-8mrf-64fw-2x75 | Command injection in fs-path | fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods. | {'CVE-2020-8298'} | 2021-03-25T21:06:41Z | 2021-03-25T21:06:41Z | CRITICAL | 9.8 | {'CWE-77'} | {'https://hackerone.com/reports/324491', 'https://github.com/pillys/fs-path/pull/6', 'https://github.com/advisories/GHSA-8mrf-64fw-2x75', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8298', 'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7'} | null | {'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7'} | {'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7'} |
GHSA | GHSA-h353-hc43-95vc | Script injection without script or programming rights through Gadget titles | ### Impact
A user without Script or Programming right is able to execute script requiring privileges by editing gadget titles in the dashboard.
### Patches
The issue has been patched in XWiki 12.6.7, 12.10.3 and 13.0RC1.
### Workarounds
There's no easy workaround for this issue, it is recommended to upgrade XWiki.
#... | {'CVE-2021-32621'} | 2021-06-28T18:40:55Z | 2021-05-18T18:36:16Z | HIGH | 8.8 | {'CWE-94'} | {'https://jay-from-future.github.io/cve/2021/06/17/xwiki-rce-cve.html', 'https://jira.xwiki.org/browse/XWIKI-17794', 'https://github.com/advisories/GHSA-h353-hc43-95vc', 'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32621', 'https:/... | null | {'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc'} | {'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc'} |
GHSA | GHSA-w285-wf9q-5w69 | In Bouncy Castle JCE Provider the ECIES implementation allowed the use of ECB mode | In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider. | {'CVE-2016-1000352'} | 2022-04-27T13:36:22Z | 2018-10-17T16:27:38Z | HIGH | 7.4 | {'CWE-326'} | {'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000352', 'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://gith... | null | {'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'} | {'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'} |
GHSA | GHSA-xfhh-g9f5-x4m4 | Resource exhaustion in socket.io-parser | The `socket.io-parser` npm package before versions 3.3.2 and 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used. | {'CVE-2020-36049'} | 2021-06-30T16:54:43Z | 2021-06-30T16:51:31Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55', 'https://github.com/advisories/GHSA-xfhh-g9f5-x4m4', 'https://github.com/bcaller/kill-engine-io', 'https://github.com/socketio/socket.io-parser/releases/tag/3.4.1', 'https://blog.caller.xyz/socketio-engineio-dos/', 'https:/... | null | {'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55'} | {'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55'} |
GHSA | GHSA-8g7p-74h8-hg48 | Denial of Service in https-proxy-agent | Versions of `https-proxy-agent` before 2.2.0 are vulnerable to denial of service. This is due to unsanitized options (proxy.auth) being passed to `Buffer()`.
## Recommendation
Update to version 2.2.0 or later. | {'CVE-2018-3739'} | 2022-04-19T19:03:26Z | 2018-07-27T17:04:52Z | CRITICAL | 9.1 | {'CWE-400', 'CWE-125'} | {'https://www.npmjs.com/advisories/593', 'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07', 'https://github.com/advisories/GHSA-8g7p-74h8-hg48', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3736', 'https://hackerone.com/reports/319532'} | null | {'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07'} | {'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07'} |
GHSA | GHSA-qxg5-2qff-p49r | Passing in a non-string 'html' argument can lead to unsanitized output | A type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function.
### Impact
XSS
### Patche... | {'CVE-2021-32696'} | 2022-04-19T19:02:59Z | 2021-06-18T19:31:35Z | MODERATE | 3.7 | {'CWE-241', 'CWE-79', 'CWE-843'} | {'https://www.npmjs.com/package/striptags', 'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca', 'https://github.com/ericnorris/striptags/releases/tag/v3.2.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32696', 'https://github.com/advisories/GHSA-qxg5-2qff-p49r', 'https://github.co... | null | {'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca'} | {'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca'} |
GHSA | GHSA-c8xp-8mf3-62h9 | OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values | Any CA issuer in the RPKI can trick OctoRPKI prior to https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 into emitting an invalid VRP "MaxLength" value, causing RTR sessions to terminate.
### Impact
An attacker can use this to disable RPKI Origin Validation in a victim network (for ... | {'CVE-2021-3761'} | 2022-04-19T19:03:07Z | 2021-09-07T23:02:18Z | HIGH | 7.5 | {'CWE-787', 'CWE-295'} | {'https://www.debian.org/security/2022/dsa-5041', 'https://github.com/cloudflare/cfrpki/releases/tag/v1.3.0', 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-c8xp-8mf3-62h9', 'https://github.com/advisories/GHSA-c8xp-8mf3-62h9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3761', 'https://github.com/cloudfl... | null | {'https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422'} | {'https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422'} |
GHSA | GHSA-86f3-hf24-76q4 | Use of Hard-coded Cryptographic Key in Netmaker | ### Impact
There is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server, if you know the address and username of the admin. This effects the server (netmaker) component, and not clients.
### Patches
This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10.... | {'CVE-2022-23650'} | 2022-04-19T19:03:24Z | 2022-02-22T19:40:23Z | HIGH | 7.2 | {'CWE-798', 'CWE-321'} | {'https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee', 'https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23650', 'https://github.com/gravitl/netmaker/security/advisories/GHSA-86f3-hf24-76q4', 'https://github... | null | {'https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee', 'https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87', 'https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080'} | {'https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87', 'https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee', 'https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080'} |
GHSA | GHSA-99cg-575x-774p | Improper Input Validation in AKPublic.Verify with attacker-controlled TPM Quote | ### Impact
An improper input validation vulnerability in go-attestation before 0.4.0 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing `AKPublic.Verify` to succeed despite the inconsistency. Subsequent use of the same set of PCR values in `Eventlog.Verify` lacks the authentication per... | {'CVE-2022-0317'} | 2022-04-19T19:03:20Z | 2022-02-01T00:43:17Z | MODERATE | 4 | {'CWE-20'} | {'https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788', 'https://github.com/advisories/GHSA-99cg-575x-774p', 'https://github.com/google/go-attestation/security/advisories/GHSA-99cg-575x-774p', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0317'} | null | {'https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788'} | {'https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788'} |
GHSA | GHSA-g4c2-ghfg-g5rh | Cross-site Scripting and Open Redirect in Products.ATContentTypes | ### Impact
Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish.
The technique is known as cache poisoning.
Any later visitor can get redirected when clicking on a link on this page.
Us... | {'CVE-2022-23599'} | 2022-02-07T21:16:59Z | 2022-01-28T23:10:37Z | MODERATE | 4.3 | {'CWE-79'} | {'https://github.com/advisories/GHSA-g4c2-ghfg-g5rh', 'https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh', 'https://github.com/plone/Products.ATContentTypes/commit/fc793f88f35a15a68b52e4abed77af0da5fdbab8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23599'} | null | {'https://github.com/plone/Products.ATContentTypes/commit/fc793f88f35a15a68b52e4abed77af0da5fdbab8'} | {'https://github.com/plone/Products.ATContentTypes/commit/fc793f88f35a15a68b52e4abed77af0da5fdbab8'} |
GHSA | GHSA-pw59-4qgf-jxr8 | Cache Manipulation Attack in Apache Traffic Control | When ORT (now via atstccfg) generates ip_allow.config files in Apache Traffic Control 3.0.0 to 3.1.0 and 4.0.0 to 4.1.0, those files include permissions that allow bad actors to push arbitrary content into and remove arbitrary content from CDN cache servers. Additionally, these permissions are potentially extended to I... | {'CVE-2020-17522'} | 2022-04-12T22:17:55Z | 2021-12-16T19:20:21Z | MODERATE | 5.8 | {'CWE-732', 'CWE-525'} | {'https://lists.apache.org/thread.html/r3de212a3da73bcf98fa2db7eafb75b2eb8e131ff466e6efc4284df09%40%3Cdev.trafficcontrol.apache.org%3E', 'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b', 'https://lists.apache.org/thread.html/rc8bfd7d4f71d61e9193efcd4699eccbab3c202ec1d75ed9d502f... | null | {'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b'} | {'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b'} |
GHSA | GHSA-8v63-cqqc-6r2c | Prototype Pollution in object-path | object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | {'CVE-2021-3805'} | 2022-04-19T19:03:28Z | 2021-09-20T20:46:43Z | HIGH | 7.5 | {'CWE-1321', 'CWE-915'} | {'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3805', 'https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053', 'https://github.com/advisories/GHSA-8v63-cqqc-6r2c'} | null | {'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884'} | {'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884'} |
GHSA | GHSA-w7q9-p3jq-fmhm | Uncontrolled resource consumption in jpeg-js | Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image. | {'CVE-2020-8175'} | 2021-01-07T23:46:38Z | 2020-07-27T15:46:57Z | MODERATE | 0 | {'CWE-400'} | {'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79', 'https://github.com/advisories/GHSA-w7q9-p3jq-fmhm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8175', 'https://hackerone.com/reports/842462'} | null | {'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79'} | {'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79'} |
GHSA | GHSA-mxjj-953w-2c2v | Data corruption in tensorflow-lite | ### Impact
When determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/types.h#L437-L442
Since the function always returns the... | {'CVE-2020-15208'} | 2021-08-26T15:16:48Z | 2020-09-25T18:28:44Z | HIGH | 7.4 | {'CWE-787', 'CWE-125'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-mxjj-953w-2c2v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15208', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mxjj-953w-2c2v', 'https://github.com/tensorflow/tensorflow/commit/8ee2... | null | {'https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d'} | {'https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d'} |
GHSA | GHSA-579x-cjvr-cqj9 | Observable Response Discrepancy in Lost Password Service | ### Impact
It is possible to enumerate usernames via the forgot password functionality
### Patches
Update to version `10.1.3` or apply this patch manually: https://github.com/pimcore/pimcore/pull/10223.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/10223.patch manually.
| {'CVE-2021-39189'} | 2021-09-28T19:05:38Z | 2021-09-20T19:53:55Z | MODERATE | 5.3 | {'CWE-204', 'CWE-203'} | {'https://github.com/pimcore/pimcore/pull/10223.patch', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39189', 'https://github.com/advisories/GHSA-579x-cjvr-cqj9', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9', 'https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/', 'https://githu... | null | {'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'} | {'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'} |
GHSA | GHSA-vqw6-72r7-fgw7 | OOB read in `MatrixTriangularSolve` | ### Impact
The implementation of [`MatrixTriangularSolve`](https://github.com/tensorflow/tensorflow/blob/8cae746d8449c7dda5298327353d68613f16e798/tensorflow/core/kernels/linalg/matrix_triangular_solve_op_impl.h#L160-L240) fails to terminate kernel execution if one validation condition fails:
```cc
void ValidateInputTe... | {'CVE-2021-29551'} | 2021-05-21T14:23:44Z | 2021-05-21T14:23:44Z | LOW | 2.5 | {'CWE-125'} | {'https://github.com/advisories/GHSA-vqw6-72r7-fgw7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29551', 'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vqw6-72r7-fgw7'} | null | {'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68'} | {'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68'} |
GHSA | GHSA-h47j-hc6x-h3qq | Remote Code Execution Vulnerability in NPM mongo-express | ### Impact
Remote code execution on the host machine by any authenticated user.
### Proof Of Concept
Launching mongo-express on a Mac, pasting the following into the "create index" field will pop open the Mac calculator:
```javascript
this.constructor.constructor("return process")().mainModule.require('child_proces... | {'CVE-2019-10758'} | 2022-04-19T19:02:23Z | 2019-12-30T19:30:31Z | HIGH | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10758', 'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494', 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq', 'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215', 'https://github.com/advisori... | null | {'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494'} | {'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494'} |
GHSA | GHSA-mjww-934m-h4jw | Improper Certificate Validation in OPCFoundation.NetStandard.Opc.Ua | A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates. | {'CVE-2020-29457'} | 2021-11-19T20:19:53Z | 2021-11-19T20:19:53Z | MODERATE | 4.4 | {'CWE-295'} | {'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229', 'https://github.com/advisories/GHSA-mjww-934m-h4jw', 'https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/', 'https://nvd.nist.gov/vuln/de... | null | {'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25'} | {'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25'} |
GHSA | GHSA-mr6r-82x4-f4jj | Timing attacks might allow practical recovery of the long-term private key | In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical... | {'CVE-2019-10764'} | 2021-08-18T22:40:49Z | 2019-11-20T01:34:50Z | HIGH | 7.4 | {'CWE-203'} | {'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9', 'https://snyk.io/vuln/SNYK-PHP-SIMPLITOELLIPTICPHP-534576', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764', 'https://github.com/advisories/GHSA-mr6r-82x4-f4jj', 'https://minerva.crocs.fi.muni.cz/'} | null | {'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'} | {'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'} |
GHSA | GHSA-r53w-g4xm-3gc6 | Cross-site scripting in Haml | In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code. | {'CVE-2017-1002201'} | 2022-01-04T19:39:12Z | 2019-10-21T21:59:13Z | MODERATE | 6.1 | {'CWE-79'} | {'https://lists.debian.org/debian-lts-announce/2019/11/msg00007.html', 'https://snyk.io/vuln/SNYK-RUBY-HAML-20362', 'https://github.com/advisories/GHSA-r53w-g4xm-3gc6', 'https://security.gentoo.org/glsa/202007-27', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002201', 'https://github.com/haml/haml/commit/18576ae6e9bdcb4... | null | {'https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2'} | {'https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2'} |
GHSA | GHSA-786j-5qwq-r36x | Segfault while copying constant resource tensor | ### Impact
During TensorFlow's Grappler optimizer phase, constant folding might attempt to deep copy a resource tensor. This results in a segfault, as these tensors are supposed to not change.
### Patches
We have patched the issue in GitHub commit [7731e8dfbe4a56773be5dc94d631611211156659](https://github.com/tensorflo... | {'CVE-2021-41204'} | 2021-11-10T19:12:14Z | 2021-11-10T19:12:14Z | MODERATE | 5.5 | {'CWE-824'} | {'https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659', 'https://github.com/advisories/GHSA-786j-5qwq-r36x', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-786j-5qwq-r36x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41204'} | null | {'https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659'} | {'https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659'} |
GHSA | GHSA-mxh3-2699-98g9 | Cross-site Scripting pimcore | pimcore version 10.3.0 and prior is vulnerable to cross-site scripting. | {'CVE-2022-0510'} | 2022-02-14T22:35:04Z | 2022-02-09T00:00:28Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-mxh3-2699-98g9', 'https://huntr.dev/bounties/bb3525d5-dedc-48b8-ab04-ad4c72499abe', 'https://github.com/pimcore/pimcore/commit/b5a9ad65e5a4dde1916f02019f8686ad835681ce', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0510'} | null | {'https://github.com/pimcore/pimcore/commit/b5a9ad65e5a4dde1916f02019f8686ad835681ce'} | {'https://github.com/pimcore/pimcore/commit/b5a9ad65e5a4dde1916f02019f8686ad835681ce'} |
GHSA | GHSA-pjh3-jv7w-9jpr | Command Injection in gm | Versions of `gm` prior to 1.21.1 are affected by a command injection vulnerability. The vulnerability is triggered when user input is passed into `gm.compare()`, which fails to sanitize input correctly before calling the graphics magic binary.
## Recommendation
Update to version 1.21.1 or later. | {'CVE-2015-7982'} | 2021-09-23T21:23:49Z | 2020-09-01T15:18:55Z | CRITICAL | 0 | {'CWE-77'} | {'https://github.com/advisories/GHSA-pjh3-jv7w-9jpr', 'https://www.npmjs.com/advisories/54', 'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7982'} | null | {'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31'} | {'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31'} |
GHSA | GHSA-gj85-pvp5-mvf9 | Cross-site Scripting in Beanstalk console | Beanstalk console prior to version 1.7.12 is vulnerable to cross-site scripting. | {'CVE-2022-0501'} | 2022-02-14T22:30:43Z | 2022-02-06T00:00:54Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/ptrofimov/beanstalk_console/commit/e351c8260ec1d3718d9e475ee57c7e12c47f19da', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0501', 'https://huntr.dev/bounties/9af1c35e-3f74-4c93-a241-e8be01335ec7', 'https://github.com/advisories/GHSA-gj85-pvp5-mvf9'} | null | {'https://github.com/ptrofimov/beanstalk_console/commit/e351c8260ec1d3718d9e475ee57c7e12c47f19da'} | {'https://github.com/ptrofimov/beanstalk_console/commit/e351c8260ec1d3718d9e475ee57c7e12c47f19da'} |
GHSA | GHSA-pr3h-jjhj-573x | High severity vulnerability that affects sprockets | Specially crafted requests can be used to access files that exist on the filesystem that is outside an application's root directory, when the Sprockets server is used in production.
All users running an affected release should either upgrade or use one of the work arounds immediately.
Workaround:
In Rails appl... | {'CVE-2018-3760'} | 2021-12-02T20:12:00Z | 2018-06-20T22:18:58Z | HIGH | 7.5 | {'CWE-200', 'CWE-22'} | {'https://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441', 'https://www.debian.org/security/2018/dsa-4242', 'https://access.redhat.com/errata/RHSA-2018:2561', 'https://access.redhat.com/errata/RHSA-2018:2244', 'https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb... | null | {'https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5f', 'https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5', 'https://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441'} | {'https://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441', 'https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5', 'https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5f'} |
GHSA | GHSA-4fc4-4p5g-6w89 | Cross-site Scripting in CKEditor4 | ### Affected packages
The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4.
### Impact
A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML bypassing content sanitiza... | {'CVE-2022-24728'} | 2022-03-31T20:51:26Z | 2022-03-16T22:47:55Z | MODERATE | 5.4 | {'CWE-79'} | {'https://securitylab.github.com/advisories/GHSL-2022-009_ckeditor4/', 'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949', 'https://ckeditor.com/cke4/release/CKEditor-4.18.0', 'https://github.com/advisories/GHSA-4fc4-4p5g-6w89', 'https://github.com/ckeditor/ckeditor4/security/adviso... | null | {'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949'} | {'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949'} |
GHSA | GHSA-5q2r-92f9-4m49 | Improper verification of signature threshold in tough | ## Impact
The tough library, prior to 0.7.1, does not properly verify the uniqueness of keys in the signatures provided to meet the threshold of cryptographic signatures. It allows someone with access to a valid signing key to create multiple valid signatures in order to circumvent TUF requiring a minimum threshold of... | {'CVE-2020-15093'} | 2022-04-19T19:02:29Z | 2021-08-25T20:56:55Z | HIGH | 8.6 | {'CWE-347'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0024.html', 'https://github.com/awslabs/tough/security/advisories/GHSA-5q2r-92f9-4m49', 'https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15093', 'https://github.com/theupdateframework/tuf... | null | {'https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e'} | {'https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e'} |
GHSA | GHSA-428x-9xc2-m8mj | Division by zero in TFLite | ### Impact
An attacker can craft a TFLite model that would trigger a division by zero in [the implementation of depthwise convolutions](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96).
The parameters of the convolution can be user c... | {'CVE-2022-21741'} | 2022-02-11T16:20:59Z | 2022-02-09T23:47:30Z | MODERATE | 6.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-428x-9xc2-m8mj', 'https:... | null | {'https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc'} | {'https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc'} |
GHSA | GHSA-82mm-ffjr-h86c | Authorization bypass in Istio | "In Istio 1.5.0 though 1.5.8 and Istio 1.6.0 through 1.6.7, when users specify an AuthorizationPolicy resource with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields, callers will never be denied access, bypassing the intended policy." | {'CVE-2020-16844'} | 2022-04-20T21:05:23Z | 2022-02-15T01:57:18Z | MODERATE | 6.8 | {'CWE-284'} | {'https://github.com/advisories/GHSA-82mm-ffjr-h86c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16844', 'https://istio.io/latest/news/security/istio-security-2020-009/', 'https://istio.io/latest/news/releases/1.5.x/announcing-1.5.9/', 'https://github.com/istio/istio/commit/4c73414556b83f0e75c1b3a0a89a23103a71573c', 'h... | null | {'https://github.com/istio/istio/commit/72d2e135374f421b656d6f1a21f474db46134ace', 'https://github.com/istio/istio/commit/4c73414556b83f0e75c1b3a0a89a23103a71573c'} | {'https://github.com/istio/istio/commit/4c73414556b83f0e75c1b3a0a89a23103a71573c', 'https://github.com/istio/istio/commit/72d2e135374f421b656d6f1a21f474db46134ace'} |
GHSA | GHSA-49rv-g7w5-m8xx | Cross-Site Scripting in @novnc/novnc | Versions of `@novnc/novnc` prior to 0.6.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to validate input from the remote VNC server such as the VNC server name. This allows an attacker in control of the remote server to execute arbitrary JavaScript in the noVNC web page. It affects any users of `incl... | {'CVE-2017-18635'} | 2022-01-04T19:37:09Z | 2020-08-28T21:24:59Z | MODERATE | 6.1 | {'CWE-79'} | {'https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html', 'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534', 'https://github.com/novnc/noVNC/issues/748', 'https://access.redhat.com/errata/RHSA-2020:0754', 'https://www.shielder.it/blog... | null | {'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534'} | {'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534'} |
GHSA | GHSA-qhx9-7hx7-cp4r | HTTP Request smuggling in bottle | The package bottle before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the serv... | {'CVE-2020-28473'} | 2021-04-07T21:05:21Z | 2021-04-07T21:05:21Z | MODERATE | 6.8 | {'CWE-444'} | {'https://snyk.io/vuln/SNYK-PYTHON-BOTTLE-1017108', 'https://github.com/advisories/GHSA-qhx9-7hx7-cp4r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28473', 'https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00019.html', 'https://github.com/b... | null | {'https://github.com/bottlepy/bottle/commit/57a2f22e0c1d2b328c4f54bf75741d74f47f1a6b'} | {'https://github.com/bottlepy/bottle/commit/57a2f22e0c1d2b328c4f54bf75741d74f47f1a6b'} |
GHSA | GHSA-xmq3-hgjx-6997 | Cross-site Scripting in Pimcore | Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0. | {'CVE-2022-0705'} | 2022-03-29T21:30:06Z | 2022-03-17T00:00:47Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-xmq3-hgjx-6997', 'https://huntr.dev/bounties/0e1b6836-e5b5-4e47-b9ab-2f6a4790ee7b', 'https://github.com/pimcore/pimcore/pull/11447', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0705', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} | null | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} |
GHSA | GHSA-7qqv-r2q4-jxhm | High severity vulnerability that affects privacyIDEA | privacyIDEA version 2.23.1 and earlier contains a Improper Input Validation vulnerability in token validation api that can result in Denial-of-Service. This attack appear to be exploitable via http request with user=<space>&pass= to /validate/check url. This vulnerability appears to have been fixed in 2.23.2. | {'CVE-2018-1000809'} | 2021-09-03T21:43:08Z | 2019-01-14T16:19:31Z | HIGH | 7.5 | {'CWE-20'} | {'https://github.com/privacyidea/privacyidea/issues/1227', 'https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751', 'https://github.com/advisories/GHSA-7qqv-r2q4-jxhm', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000809'} | null | {'https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751'} | {'https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751'} |
GHSA | GHSA-xmgj-5fh3-xjmm | Path traversal when MessageBus::Diagnostics is enabled | ### Impact
Users who deployed message bus with diagnostics features enabled (default off) were vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for you... | {'CVE-2021-43840'} | 2022-01-03T15:46:44Z | 2021-12-17T19:59:13Z | MODERATE | 4.2 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43840', 'https://github.com/advisories/GHSA-xmgj-5fh3-xjmm', 'https://github.com/discourse/message_bus/security/advisories/GHSA-xmgj-5fh3-xjmm', 'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba'} | null | {'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba'} | {'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba'} |
GHSA | GHSA-jj4f-p7vv-j4v9 | Arbitrary code execution in Apache Druid | Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary c... | {'CVE-2021-26919'} | 2021-06-16T17:51:58Z | 2021-06-16T17:51:58Z | HIGH | 0 | {'CWE-668'} | {'https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26919', 'https://lists.apache.org/thread.html/r7a531ec123570cb7875ff991cf115f99e9ef99a48b3cf3fa4f9d9864@%3Ccommits.druid.apache.org%3E', 'https://git... | null | {'https://github.com/apache/druid/commit/48953e3508967f5156c69676432b5d4dd25ea678'} | {'https://github.com/apache/druid/commit/48953e3508967f5156c69676432b5d4dd25ea678'} |
GHSA | GHSA-xvjm-fvxx-q3hv | CHECK-fail due to integer overflow | ### Impact
An attacker can trigger a denial of service via a `CHECK`-fail in caused by an integer overflow in constructing a new tensor shape:
```python
import tensorflow as tf
input_layer = 2**60-1
sparse_data = tf.raw_ops.SparseSplit(
split_dim=1,
indices=[(0, 0), (0, 1), (0, 2),
(4, 3), (5, 0), (5, ... | {'CVE-2021-29584'} | 2021-05-21T14:26:38Z | 2021-05-21T14:26:38Z | LOW | 2.5 | {'CWE-190'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29584', 'https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xvjm-fvxx-q3hv', 'https://github.com/advisories/GHSA-xvjm-fvxx-q3hv'} | null | {'https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60'} | {'https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60'} |
GHSA | GHSA-xwg4-93c6-3h42 | Directory Traversal in send | Versions 0.8.3 and earlier of `send` are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory.
For example, `static(_dirname + '/... | {'CVE-2014-6394'} | 2021-09-22T17:58:57Z | 2017-10-24T18:33:36Z | LOW | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-xwg4-93c6-3h42', 'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a', 'http://www.securityfocus.com/bid/70100', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=114606... | null | {'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a'} | {'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a'} |
GHSA | GHSA-r5cq-9537-9rpf | Prototype Pollution in mixme | Node.js mixme 0.5.0, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS). | {'CVE-2021-28860'} | 2022-02-10T23:52:01Z | 2022-02-10T23:52:01Z | CRITICAL | 9.1 | {'CWE-1321'} | {'http://nodejs.com', 'https://www.npmjs.com/~david', 'https://github.com/adaltas/node-mixme/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28860', 'https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9... | null | {'https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028'} | {'https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028'} |
GHSA | GHSA-cpv8-6xgr-rmf6 | Cross-site Scripting in Dolibarr | In “Dolibarr ERP CRM”, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the “Private Note” field at “/adherents/note.php?id=1” endpoint. These scripts are executed in a victim’s browser when they open the page ... | {'CVE-2021-25955'} | 2021-10-21T14:19:19Z | 2021-08-30T16:22:46Z | CRITICAL | 9 | {'CWE-79'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25955', 'https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25955', 'https://github.com/advisories/GHSA-cpv8-6xgr-rmf6'} | null | {'https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e'} | {'https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e'} |
GHSA | GHSA-7c7g-72q7-4xhm | Prototype pollution vulnerability in 'deepref' | Prototype pollution vulnerability in 'deepref' versions 1.1.1 through 1.2.1 allows attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2020-28274'} | 2021-10-12T16:27:35Z | 2021-10-12T16:27:35Z | CRITICAL | 9.8 | null | {'https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28274', 'https://github.com/advisories/GHSA-7c7g-72q7-4xhm', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28274'} | null | {'https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2'} | {'https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2'} |
GHSA | GHSA-xh9g-cp3v-p8q4 | Missing Authorization in Crater Invoice | Crater Invoice prior to version 6.0.2 has a missing authorization vulnerability.. | {'CVE-2022-0203'} | 2022-02-10T22:25:36Z | 2022-01-27T00:01:17Z | MODERATE | 5.3 | {'CWE-862', 'CWE-284'} | {'https://github.com/crater-invoice/crater/commit/dd324c8bb6b17009f82afe8bc830caec7241e992', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0203', 'https://huntr.dev/bounties/395fc553-2b90-4e69-ba07-a316e1c06406', 'https://github.com/advisories/GHSA-xh9g-cp3v-p8q4'} | null | {'https://github.com/crater-invoice/crater/commit/dd324c8bb6b17009f82afe8bc830caec7241e992'} | {'https://github.com/crater-invoice/crater/commit/dd324c8bb6b17009f82afe8bc830caec7241e992'} |
GHSA | GHSA-xrx6-fmxq-rjj2 | Timing attacks in python-rsa | It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA. | {'CVE-2020-25658'} | 2021-09-27T18:38:48Z | 2021-04-30T17:35:15Z | MODERATE | 5.9 | {'CWE-327', 'CWE-385'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-25658', 'https://github.com/sybrenstuvel/python-rsa/commit/dae8ce0d85478e16f2368b2341632775313d41ed', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658', 'https://github.com/advisories/GHSA-xrx6-fmxq-rjj2', 'https://github.com/sybrenstuvel/python-rsa/issues/165', 'h... | null | {'https://github.com/sybrenstuvel/python-rsa/commit/dae8ce0d85478e16f2368b2341632775313d41ed'} | {'https://github.com/sybrenstuvel/python-rsa/commit/dae8ce0d85478e16f2368b2341632775313d41ed'} |
GHSA | GHSA-9534-h433-2rjf | Improperly Controlled Modification of Dynamically-Determined Object Attributes in utilitify | utilitify prior to 1.0.3 allows modification of object properties. The merge method could be tricked into adding or modifying properties of the Object.prototype. | {'CVE-2019-10808'} | 2021-07-28T18:40:29Z | 2021-05-07T16:28:47Z | HIGH | 8.8 | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-UTILITIFY-559497', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10808', 'https://github.com/advisories/GHSA-9534-h433-2rjf', 'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'} | null | {'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'} | {'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'} |
GHSA | GHSA-3329-pjwv-fjpg | Hostname spoofing via backslashes in URL | ### Impact
If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a backslash (`\`) character followed by an at (`@`) character. If the hostname is used in security decisions, the decision may be incorrect.
Depending on library usage and attacker intent, impacts may include allo... | {'CVE-2020-26291'} | 2022-04-19T19:02:43Z | 2020-12-30T23:40:48Z | MODERATE | 6.5 | {'CWE-20'} | {'https://www.npmjs.com/package/urijs', 'https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155', 'https://github.com/advisories/GHSA-3329-pjwv-fjpg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26291', 'https://github.com/medialize/URI.js/releases/tag/v1.19.4', 'https://www.npmjs.com/adviso... | null | {'https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155'} | {'https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.