ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-rgvq-pcvf-hx75
Heap OOB and null pointer dereference in `RaggedTensorToTensor`
### Impact Due to lack of validation in `tf.raw_ops.RaggedTensorToTensor`, an attacker can exploit an undefined behavior if input arguments are empty: ```python import tensorflow as tf shape = tf.constant([-1, -1], shape=[2], dtype=tf.int64) values = tf.constant([], shape=[0], dtype=tf.int64) default_value = tf.const...
{'CVE-2021-29608'}
2021-05-21T14:28:27Z
2021-05-21T14:28:27Z
MODERATE
5.3
{'CWE-131'}
{'https://github.com/tensorflow/tensorflow/commit/b761c9b652af2107cfbc33efd19be0ce41daa33e', 'https://github.com/tensorflow/tensorflow/commit/c4d7afb6a5986b04505aca4466ae1951686c80f6', 'https://github.com/advisories/GHSA-rgvq-pcvf-hx75', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rgvq-pcvf-hx75'...
null
{'https://github.com/tensorflow/tensorflow/commit/b761c9b652af2107cfbc33efd19be0ce41daa33e', 'https://github.com/tensorflow/tensorflow/commit/c4d7afb6a5986b04505aca4466ae1951686c80f6', 'https://github.com/tensorflow/tensorflow/commit/f94ef358bb3e91d517446454edff6535bcfe8e4a'}
{'https://github.com/tensorflow/tensorflow/commit/c4d7afb6a5986b04505aca4466ae1951686c80f6', 'https://github.com/tensorflow/tensorflow/commit/b761c9b652af2107cfbc33efd19be0ce41daa33e', 'https://github.com/tensorflow/tensorflow/commit/f94ef358bb3e91d517446454edff6535bcfe8e4a'}
GHSA
GHSA-77gp-3h4r-6428
Out of bounds read and write in Tensorflow
### Impact There is a typo in TensorFlow's [`SpecializeType`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102) which results in heap OOB read/write: ```cc for (int i = 0; i < op_def.output_arg_size(); i++) { // ... for (int...
{'CVE-2022-23574'}
2022-02-11T20:46:43Z
2022-02-09T23:25:40Z
HIGH
8.8
{'CWE-787', 'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-77gp-3h4r-6428', ...
null
{'https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042'}
{'https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042'}
GHSA
GHSA-7322-jrq4-x5hf
File reference keys leads to incorrect hashes on HMAC algorithms
### Impact Users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents. The HMAC hashing functions take any string as input and, since users can issue an...
{'CVE-2021-41106'}
2022-04-19T19:03:10Z
2021-09-29T17:09:40Z
MODERATE
4.4
{'CWE-345'}
{'https://github.com/advisories/GHSA-7322-jrq4-x5hf', 'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41106'}
null
{'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'}
{'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'}
GHSA
GHSA-8fp4-rp6c-5gcv
Path Traversal in com.linecorp.armeria:armeria
### Impact An attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic. ### Patches Armeria 1.13.4 or above contains the hardened path vali...
{'CVE-2021-43795'}
2021-12-03T15:15:09Z
2021-12-02T22:25:54Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43795', 'https://github.com/line/armeria/pull/3855', 'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284', 'https://github.com/line/armeria/security/advisories/GHSA-8fp4-rp6c-5gcv', 'https://github.com/advisories/GHSA-8fp4-rp6c-5gcv'}
null
{'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284'}
{'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284'}
GHSA
GHSA-9vwf-54m9-gc4f
snipe-it is vulnerable to Improper Access Control
snipe-it is vulnerable to Improper Access Control
{'CVE-2021-4089'}
2021-12-16T14:32:39Z
2021-12-16T14:32:39Z
MODERATE
4.3
{'CWE-863', 'CWE-284'}
{'https://github.com/advisories/GHSA-9vwf-54m9-gc4f', 'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24', 'https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4089'}
null
{'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'}
{'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'}
GHSA
GHSA-rphc-h572-2x9f
Cross-site Scripting in showdoc/showdoc
ShowDoc is a tool greatly applicable for an IT team to share documents online. showdoc/showdoc allows .properties files to upload which lead to stored XSS in versions prior to 2.10.4. This allows attackers to execute malicious scripts in the user's browser. This issue was patched in version 2.10.4. There is currently n...
{'CVE-2022-0960'}
2022-03-24T22:38:55Z
2022-03-15T00:00:55Z
CRITICAL
9
{'CWE-434', 'CWE-79'}
{'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f', 'https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0960', 'https://github.com/advisories/GHSA-rphc-h572-2x9f'}
null
{'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'}
{'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'}
GHSA
GHSA-wwgq-9jhf-qgw6
Cross-Site Request Forgery allowing sending of test emails and generation of node auto-deployment keys
### Impact Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints: * Sending a test email. * Generating a node auto-deployment token. At no point would any data be exposed to the malicious user, this would simply trigger email sp...
{'CVE-2021-41273'}
2022-04-19T19:03:15Z
2021-11-18T15:46:57Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-wwgq-9jhf-qgw6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41273', 'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-wwgq-9jhf-qgw6'}
null
{'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'}
{'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'}
GHSA
GHSA-58r4-h6v8-jcvm
Regression in JWT Signature Validation
### Overview Versions after and including `2.3.0` are improperly validating the JWT token signature when using the `JWTValidator.verify` method. Improper validation of the JWT token signature when not using the default Authorization Code Flow can allow an attacker to bypass authentication and authorization. ### Am I ...
{'CVE-2020-15240'}
2021-11-19T14:41:31Z
2020-11-03T02:31:38Z
HIGH
7.4
{'CWE-287', 'CWE-347'}
{'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a', 'https://rubygems.org/gems/omniauth-auth0', 'https://github.com/advisories/GHSA-58r4-h6v8-jcvm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15240', 'https://github.com/auth0/omniauth-auth0/security/advisories/GHSA-58r4-h6v8-jcvm...
null
{'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a'}
{'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a'}
GHSA
GHSA-7r28-3m3f-r2pr
Regular Expression Denial of Service (ReDoS)
The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time.
{'CVE-2021-28092'}
2021-05-14T17:09:26Z
2021-03-19T21:25:50Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-7r28-3m3f-r2pr', 'https://github.com/sindresorhus/is-svg/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28092', 'https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2', 'https://www.npmjs.com/package/is-svg', 'https://security.netapp.com/advisory/ntap-20210513-0008/', 'h...
null
{'https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b'}
{'https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b'}
GHSA
GHSA-pp7m-6j83-m7r6
Cross-site Scripting in video.js
This affects the package video.js before 7.14.3. The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.
{'CVE-2021-23414'}
2021-08-31T21:01:29Z
2021-08-10T16:09:36Z
MODERATE
6.5
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23414', 'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587', 'https://github.com/advisories/GHSA-pp7m-6j83-m7r6', 'https://snyk.io/vuln/SN...
null
{'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2'}
{'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2'}
GHSA
GHSA-vfr4-x8j2-3rf9
Division by zero in TFLite's implementation of `TransposeConv`
### Impact The optimized implementation of the `TransposeConv` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L5221-L5222): ```cc int height_col = (height + pa...
{'CVE-2021-29588'}
2021-05-21T14:26:48Z
2021-05-21T14:26:48Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vfr4-x8j2-3rf9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29588', 'https://github.com/advisories/GHSA-vfr4-x8j2-3rf9'}
null
{'https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d'}
{'https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d'}
GHSA
GHSA-pjxv-w3qj-j8m3
Directory Traversal in elFinder.AspNet
This affects the package elFinder.AspNet before 1.1.1. The user-controlled file name is not properly sanitized before it is used to create a file system path.
{'CVE-2021-23415'}
2021-08-31T21:00:59Z
2021-08-09T20:42:13Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23415', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153', 'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720', 'https://github.com/advisories/GHSA-pjxv-w3qj-j8m3'}
null
{'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720'}
{'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720'}
GHSA
GHSA-8m49-2xj8-67v9
Data Loss/Denial of Service in SWHKD
SWHKD 1.1.5 unsafely uses the /tmp/swhks.pid pathname. There can be data loss or a denial of service. A patch is available on the `1.1.0` branch of the repository.
{'CVE-2022-27816'}
2022-04-28T18:02:04Z
2022-03-31T00:00:24Z
HIGH
7.1
{'CWE-59'}
{'https://github.com/waycrate/swhkd/commit/0b620a09605afb815c6d8d8953bbb7a10a8c0575', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27816', 'https://github.com/advisories/GHSA-8m49-2xj8-67v9', 'http://www.openwall.com/lists/oss-security/2022/04/14/1'}
null
{'https://github.com/waycrate/swhkd/commit/0b620a09605afb815c6d8d8953bbb7a10a8c0575'}
{'https://github.com/waycrate/swhkd/commit/0b620a09605afb815c6d8d8953bbb7a10a8c0575'}
GHSA
GHSA-fcqf-h4h4-695m
Moderate severity vulnerability that affects actionpack
CRLF injection vulnerability in actionpack/lib/action_controller/response.rb in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header.
{'CVE-2011-3186'}
2021-09-10T17:32:18Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2011-3186', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9', 'http://secunia.com/advisories/45921', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html', ...
null
{'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9'}
{'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9'}
GHSA
GHSA-rf54-44jr-q5vf
Improper Input Validation in url-js
The package url-js before 2.1.0 is vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is.
{'CVE-2022-25839'}
2022-03-28T22:33:08Z
2022-03-12T00:00:26Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/advisories/GHSA-rf54-44jr-q5vf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25839', 'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0', 'https://snyk.io/vuln/SNYK-JS-URLJS-2414030'}
null
{'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0'}
{'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0'}
GHSA
GHSA-gpfh-jvf9-7wg5
Use after free / memory leak in `CollectiveReduceV2`
### Impact The [async implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/collective_ops.cc#L604-L615) of `CollectiveReduceV2` suffers from a memory leak and a use after free: ```python import tensorflow as tf tf.raw_ops.CollectiveReduceV2( ...
{'CVE-2021-41220'}
2021-11-10T18:51:21Z
2021-11-10T18:51:21Z
HIGH
7.8
{'CWE-416'}
{'https://github.com/advisories/GHSA-gpfh-jvf9-7wg5', 'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41220', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gpfh-jvf9-7wg5'}
null
{'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75'}
{'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75'}
GHSA
GHSA-wc7v-77jr-5c3m
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3944'}
2021-12-03T20:38:37Z
2021-12-03T20:38:37Z
LOW
3.1
{'CWE-352'}
{'https://github.com/advisories/GHSA-wc7v-77jr-5c3m', 'https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9', 'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3944'}
null
{'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'}
{'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'}
GHSA
GHSA-4vhj-98r6-424h
In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the signature and still have it validate
In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed...
{'CVE-2016-1000338'}
2022-04-27T13:26:49Z
2018-10-17T16:23:26Z
HIGH
7.5
{'CWE-347'}
{'https://github.com/advisories/GHSA-4vhj-98r6-424h', 'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://nvd....
null
{'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0'}
{'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0'}
GHSA
GHSA-vwxp-9qmf-w299
Cross-site Scripting in LiveHelperChat
LiveHelperChat (remdex/livehelperchat in Packagist) has a stored Cross-site Scripting (XSS) vulnerability prior to version 3.93.
{'CVE-2022-0394'}
2022-02-03T19:18:03Z
2022-02-01T00:49:48Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0394', 'https://github.com/advisories/GHSA-vwxp-9qmf-w299', 'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3', 'https://huntr.dev/bounties/e13823d0-271c-448b-a0c5-8549ea7ea272'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'}
{'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'}
GHSA
GHSA-grpf-gg7v-5g5h
SQL Injection in Apache SkyWalking
Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases.
{'CVE-2020-13921'}
2021-05-07T15:53:31Z
2021-05-07T15:53:31Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-grpf-gg7v-5g5h', 'https://github.com/apache/skywalking/pull/4970', 'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951', 'http://www.openwall.com/lists/oss-security/2020/08/05/3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13921', 'https://lists.apa...
null
{'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951'}
{'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951'}
GHSA
GHSA-rf3h-xgv5-2q39
Division by zero in TFLite's implementation of `DepthwiseConv`
### Impact The implementation of the `DepthwiseConv` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/depthwise_conv.cc#L287-L288): ```cc int num_input_channels = SizeOfDimension(input, 3); TF_LITE...
{'CVE-2021-29602'}
2021-05-21T14:28:12Z
2021-05-21T14:28:12Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rf3h-xgv5-2q39', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29602', 'https://github.com/advisories/GHSA-rf3h-xgv5-2q39', 'https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0'}
null
{'https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0'}
{'https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0'}
GHSA
GHSA-rfq3-w54c-f9q5
OAuth2 Redirect URL validity does not respect query parameters and character casing for loopback addresses
### Impact [fosite#400](https://github.com/ory/fosite/pull/400) (released as v0.30.2) introduced a new feature for handling redirect URLs pointing to loopback interfaces ([rfc8252#section-7.3](https://tools.ietf.org/html/rfc8252#section-7.3)). As part of that change new behavior was introduced which failed to respect ...
{'CVE-2020-15233'}
2022-04-19T19:02:35Z
2021-05-24T17:00:12Z
MODERATE
5.5
{'CWE-20', 'CWE-601'}
{'https://github.com/ory/fosite/pull/400', 'https://github.com/advisories/GHSA-rfq3-w54c-f9q5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15233', 'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf', 'https://github.com/ory/fosite/security/advisories/GHSA-rfq3-w54c-f9q5'}
null
{'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf'}
{'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf'}
GHSA
GHSA-rfjc-xrmf-5vvw
Privilege escalation by backend users assigned to the default "Publisher" system role
### Impact Backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access. ### Patches Issue has been patched in Build 470 (v1.0...
{'CVE-2020-15248'}
2022-04-19T19:02:37Z
2020-11-23T19:47:27Z
LOW
4
{'CWE-863', 'CWE-269'}
{'https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829', 'https://github.com/advisories/GHSA-rfjc-xrmf-5vvw', 'https:...
null
{'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982'}
{'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829'}
GHSA
GHSA-x9p2-fxq6-2m5f
Reverse Tabnapping in swagger-ui
Versions of `swagger-ui` prior to 3.18.0 are vulnerable to [Reverse Tabnapping](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page. This is commonly used for phishing attacks. ## Recommendation Upg...
null
2021-08-16T23:44:48Z
2019-06-20T14:33:07Z
MODERATE
4.3
{'CWE-1022'}
{'https://github.com/swagger-api/swagger-ui/pull/4789', 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449808', 'https://github.com/advisories/GHSA-x9p2-fxq6-2m5f', 'https://github.com/swagger-api/swagger-ui/releases/tag/v3.18.0', 'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf', 'ht...
null
{'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf'}
{'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf'}
GHSA
GHSA-rqjq-mrgx-85hp
Allocation of Resources Without Limits or Throttling in Hashicorp Consul
HashiCorp Consul and Consul Enterprise include an HTTP API (introduced in 1.2.0) and DNS (introduced in 1.4.3) caching feature that was vulnerable to denial of service. Fixed in 1.6.6 and 1.7.4.
{'CVE-2020-13250'}
2021-07-29T18:19:35Z
2021-05-18T18:21:35Z
HIGH
7.5
{'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13250', 'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/pull/8023', 'https://github.com/hashicorp/consul/commit/72f92ae7ca4cabc1dc3069362a9b64ef46941432', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md', 'htt...
null
{'https://github.com/hashicorp/consul/commit/72f92ae7ca4cabc1dc3069362a9b64ef46941432'}
{'https://github.com/hashicorp/consul/commit/72f92ae7ca4cabc1dc3069362a9b64ef46941432'}
GHSA
GHSA-xp5q-77mh-6hm2
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3728'}
2021-08-25T14:50:17Z
2021-08-25T14:50:17Z
MODERATE
6.5
{'CWE-352'}
{'https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d', 'https://github.com/advisories/GHSA-xp5q-77mh-6hm2', 'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3728'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e'}
{'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e'}
GHSA
GHSA-jrfj-98qg-qjgv
Denial of service in sidekiq
In api.rb in Sidekiq before 6.4.0 and 5.2.10, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users.
{'CVE-2022-23837'}
2022-03-11T20:13:54Z
2022-01-27T14:42:37Z
HIGH
7.5
{'CWE-400', 'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23837', 'https://github.com/rubysec/ruby-advisory-db/pull/495', 'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html', 'https://github.com/TUTUMSPACE/exploits/blob/main/sideki...
null
{'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956'}
{'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956'}
GHSA
GHSA-3wwj-wh2w-g4xp
CRLF Injection in microweber
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0666'}
2022-02-26T01:14:30Z
2022-02-19T00:01:35Z
HIGH
7.6
{'CWE-93'}
{'https://github.com/advisories/GHSA-3wwj-wh2w-g4xp', 'https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55', 'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0666'}
null
{'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'}
{'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'}
GHSA
GHSA-4952-p58q-6crx
JupyterLab: XSS due to lack of sanitization of the action attribute of an html <form>
### Impact Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook. ### Patches Patched in the following versions: 3.1.4, 3.0.17, 2.3.2, 2.2.10, 1.2.21. ### References [OWASP Page on Restricting Form Submissions](https://cheatsheetseries.owasp.org/c...
{'CVE-2021-32797'}
2022-04-08T21:47:11Z
2021-08-23T19:40:22Z
HIGH
7.4
{'CWE-87', 'CWE-79', 'CWE-75'}
{'https://github.com/advisories/GHSA-4952-p58q-6crx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32797', 'https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx', 'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed', 'https://github.com/google/security-res...
null
{'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed'}
{'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed'}
GHSA
GHSA-4p92-fv6v-fhfj
Cross-site Scripting in microweber
Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting.
{'CVE-2022-0723'}
2022-03-09T20:43:45Z
2022-02-27T00:00:15Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-4p92-fv6v-fhfj', 'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5', 'https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0723'}
null
{'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'}
{'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'}
GHSA
GHSA-jcpv-g9rr-qxrc
Regular Expression Denial of Service in hawk
Versions of `hawk` prior to 3.1.3, or 4.x prior to 4.1.1 are affected by a regular expression denial of service vulnerability related to excessively long headers and URI's. ## Recommendation Update to hawk version 4.1.1 or later.
{'CVE-2016-2515'}
2021-09-14T19:39:20Z
2018-07-31T22:52:00Z
HIGH
7.5
null
{'https://github.com/advisories/GHSA-jcpv-g9rr-qxrc', 'https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa', 'https://bugzilla.redhat.com/show_bug.cgi?id=1309721', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2515', 'https://nodesecurity.io/advisories/77', 'https://github.com/hueniverse/haw...
null
{'https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa'}
{'https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa'}
GHSA
GHSA-ch68-7cf4-35vr
Limited ability to spoof SAML authentication with missing audience verification in Fleet
### Impact This impacts deployments using SAML SSO in two specific cases: 1. A malicious or compromised Service Provider (SP) could reuse the SAML response to log into Fleet as a user -- only if the user has an account with the same email in Fleet, _and_ the user signs into the malicious SP via SAML SSO from the same...
{'CVE-2022-23600'}
2022-04-19T19:03:21Z
2022-02-07T21:57:38Z
MODERATE
5.3
{'CWE-287', 'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23600', 'https://github.com/fleetdm/fleet/security/advisories/GHSA-ch68-7cf4-35vr', 'https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374', 'https://github.com/advisories/GHSA-ch68-7cf4-35vr'}
null
{'https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374'}
{'https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374'}
GHSA
GHSA-xqxm-2rpm-3889
Comment reply notifications sent to incorrect users
### Impact When notifications for new replies in comment threads are sent, they are sent to all users who have replied or commented anywhere on the site, rather than only in the relevant threads. This means that a user could listen in to new comment replies on pages they have not had editing access to, as long as they ...
{'CVE-2022-21683'}
2022-04-19T19:03:19Z
2022-01-21T23:43:50Z
LOW
3.5
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21683', 'https://github.com/wagtail/wagtail/releases/tag/v2.15.2', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-xqxm-2rpm-3889', 'https://github.com/advisories/GHSA-xqxm-2rpm-3889', 'https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a8975829512...
null
{'https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a897582951266afd'}
{'https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a897582951266afd'}
GHSA
GHSA-6rv4-4qv6-88g2
Prototype Pollution in set-or-get
Prototype pollution vulnerability in ‘set-or-get’ version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25913'}
2021-04-12T17:39:19Z
2021-04-12T17:39:19Z
CRITICAL
9.8
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25913', 'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936', 'https://github.com/advisories/GHSA-6rv4-4qv6-88g2', 'https://www.npmjs.com/package/set-or-get'...
null
{'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936'}
{'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936'}
GHSA
GHSA-84g3-cv89-m9gm
Prototype pollution vulnerability in 'patchmerge'
Prototype pollution vulnerability in 'patchmerge' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25916'}
2021-10-13T15:33:20Z
2021-10-13T15:33:20Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916', 'https://github.com/advisories/GHSA-84g3-cv89-m9gm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25916'}
null
{'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12'}
{'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12'}
GHSA
GHSA-c265-37vj-cwcc
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2).
{'CVE-2020-14062'}
2021-10-21T21:08:02Z
2020-06-18T14:44:48Z
HIGH
8.1
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/issues/2704', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14062', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://snyk.io/vuln/SNYK-JAVA...
null
{'https://github.com/FasterXML/jackson-databind/commit/99001cdb6807b5c7b170ec6a9092ecbb618ae79c'}
{'https://github.com/FasterXML/jackson-databind/commit/99001cdb6807b5c7b170ec6a9092ecbb618ae79c'}
GHSA
GHSA-7v94-64hj-m82h
FPE in `ParallelConcat`
### Impact The [implementation of `ParallelConcat`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/inplace_ops.cc#L72-L97) misses some input validation and can produce a division by 0: ```python import tensorflow as tf @tf.function def test(): y = tf.r...
{'CVE-2021-41207'}
2021-11-10T19:02:57Z
2021-11-10T19:02:57Z
MODERATE
5.5
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41207', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7v94-64hj-m82h', 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235', 'https://github.com/advisories/GHSA-7v94-64hj-m82h'}
null
{'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'}
{'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'}
GHSA
GHSA-pgcr-7wm4-mcv6
Sensitive Data Exposure in pem
Versions of `pem` before 1.13.2 expose sensitive data when the `readPkcs12` is used. The `readPkcs12` function reads the certificate and key data from a pkcs12 file using the encryption password. As part of this process it creates a globally readable file with a filename of 20 random 0-f characters in the temporary d...
null
2021-08-04T21:28:02Z
2019-06-04T15:42:45Z
CRITICAL
7.5
{'CWE-200'}
{'https://snyk.io/vuln/SNYK-JS-PEM-173687', 'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb', 'https://github.com/advisories/GHSA-pgcr-7wm4-mcv6', 'https://github.com/Dexus/pem/pull/217', 'https://www.npmjs.com/advisories/723'}
null
{'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb'}
{'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb'}
GHSA
GHSA-7vxr-6cxg-j3x8
OS Command Injection in ftpd
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
{'CVE-2013-2512'}
2021-10-12T22:33:59Z
2021-10-12T22:33:59Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c', 'http://vapidlabs.com/advisory.php?v=34', 'https://github.com/advisories/GHSA-7vxr-6cxg-j3x8', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2512'}
null
{'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c'}
{'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c'}
GHSA
GHSA-v2wc-pfq2-5cm6
Possible XSS attack in Wagtail
### Impact A cross-site scripting (XSS) vulnerability exists on the page revision comparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform ac...
{'CVE-2020-11001'}
2022-04-19T19:02:25Z
2020-04-14T23:09:29Z
MODERATE
5.8
{'CWE-80'}
{'https://github.com/wagtail/wagtail/releases/tag/v2.8.1', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-v2wc-pfq2-5cm6', 'https://github.com/advisories/GHSA-v2wc-pfq2-5cm6', 'https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1...
null
{'https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389'}
{'https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389'}
GHSA
GHSA-hwvm-vfw8-93mw
Vulnerable dependency in XTDB connector
### Impact The impacted portion of the XTDB connector is its connectivity to S3 as a backing store: this is the only portion of the connector that uses this vulnerable `httpclient` dependency. Per the description, the vulnerability regards URIs that may be misinterpreted, which given the area of impact within the conn...
null
2021-12-16T18:53:32Z
2021-12-16T18:53:32Z
MODERATE
5.3
null
{'https://github.com/odpi/egeria-connector-xtdb/security/advisories/GHSA-hwvm-vfw8-93mw', 'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15', 'https://github.com/advisories/GHSA-hwvm-vfw8-93mw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956'}
null
{'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15'}
{'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15'}
GHSA
GHSA-828x-qc2p-wprq
Undefined behavior in `MaxPool3DGradGrad`
### Impact The implementation of `tf.raw_ops.MaxPool3DGradGrad` exhibits undefined behavior by dereferencing null pointers backing attacker-supplied empty tensors: ```python import tensorflow as tf orig_input = tf.constant([0.0], shape=[1, 1, 1, 1, 1], dtype=tf.float32) orig_output = tf.constant([0.0], shape=[1, 1, 1...
{'CVE-2021-29574'}
2021-05-21T14:26:10Z
2021-05-21T14:26:10Z
LOW
2.5
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29574', 'https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4', 'https://github.com/advisories/GHSA-828x-qc2p-wprq', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-828x-qc2p-wprq'}
null
{'https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4'}
{'https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4'}
GHSA
GHSA-j5qg-w9jg-3wg3
Inability to de-op players if listed in ops.txt with non-lowercase letters
### Impact Originally reported in iTXTech/Genisys#1188 ```txt PotterHarry98 potterharry98 ``` `deop PotterHarry98` will remove `potterharry98` from the ops.txt but not `PotterHarry98`. Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match: https://github.com/p...
null
2022-04-19T19:03:17Z
2021-12-16T18:53:57Z
LOW
3.3
null
{'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403', 'https://github.com/iTXTech/Genisys/issues/1188', 'https://github.com/advis...
null
{'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'}
{'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'}
GHSA
GHSA-5gm3-px64-rw72
Uncontrolled Resource Consumption in Pillow
There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python th...
{'CVE-2019-19911'}
2021-08-23T15:06:45Z
2020-04-01T16:36:44Z
HIGH
7.5
{'CWE-190'}
{'https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d', 'https://github.com/advisories/GHSA-5gm3-px64-rw72', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19911', 'https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02', 'https://www.debian.org/security/2020/dsa-...
null
{'https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d'}
{'https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d'}
GHSA
GHSA-j5rj-g695-342r
Moderate severity vulnerability that affects fat_free_crm
FatFreeCRM version <=0.14.1, >=0.15.0 <=0.15.1, >=0.16.0 <=0.16.3, >=0.17.0 <=0.17.2, ==0.18.0 contains a Cross Site Scripting (XSS) vulnerability in commit 6d60bc8ed010c4eda05d6645c64849f415f68d65 that can result in Javascript execution. This attack appear to be exploitable via Content with Javascript payload will be ...
{'CVE-2018-1000842'}
2021-09-14T18:25:50Z
2018-12-20T22:01:54Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000842', 'https://groups.google.com/forum/#!topic/fat-free-crm-users/TxsdZXSe7Jc', 'https://github.com/advisories/GHSA-j5rj-g695-342r', 'https://github.com/asteinhauser/fat_free_c...
null
{'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa'}
{'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa'}
GHSA
GHSA-9236-8w7q-rmrv
archivy is vulnerable to Cross-Site Request Forgery (CSRF)
archivy is vulnerable to Cross-Site Request Forgery (CSRF). There is [a fix](https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d) available in the master branch.
{'CVE-2021-4162'}
2022-01-06T21:59:50Z
2022-01-06T21:59:50Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d', 'https://huntr.dev/bounties/e204a768-2129-4b6f-abad-e436309c7c32', 'https://github.com/advisories/GHSA-9236-8w7q-rmrv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4162'}
null
{'https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d'}
{'https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d'}
GHSA
GHSA-6g88-vr3v-76mf
Eval injection in Supybot/Limnoria
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.
{'CVE-2019-19010'}
2021-08-18T22:35:12Z
2019-11-20T01:31:31Z
CRITICAL
9.8
{'CWE-94'}
{'https://github.com/ProgVal/Limnoria/commit/3848ae78de45b35c029cc333963d436b9d2f0a35', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5P2AGND54UIJV3WHOYO2YINIXSDGAAPO/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19010', 'https://lists.fedoraproject.org/archives/list/pa...
null
{'https://github.com/ProgVal/Limnoria/commit/3848ae78de45b35c029cc333963d436b9d2f0a35'}
{'https://github.com/ProgVal/Limnoria/commit/3848ae78de45b35c029cc333963d436b9d2f0a35'}
GHSA
GHSA-2hjr-fg6c-v2h6
Unauthorized access to Class instance in Jinjava
Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure.
{'CVE-2020-12668'}
2022-02-09T00:33:56Z
2022-02-09T00:33:56Z
MODERATE
6.5
{'CWE-200'}
{'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b', 'https://github.com/HubSpot/jinjava/compare/jinjava-2.5.3...jinjava-2.5.4', 'https://securitylab.github.com/advisories/GHSL-2020-072-hubspot_jinjava', 'https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.5.4', 'https:...
null
{'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b', 'https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165'}
{'https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165', 'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b'}
GHSA
GHSA-cxm3-v4mv-6mh8
Cross-site Scripting in vditor
vditor does not filter user input
{'CVE-2021-4103'}
2022-01-28T22:04:11Z
2022-01-28T22:04:11Z
MODERATE
0
{'CWE-79'}
{'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d', 'https://github.com/advisories/GHSA-cxm3-v4mv-6mh8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4103', 'https://huntr.dev/bounties/67b980af-7357-4879-9448-a926c6474225', 'https://github.com/Vanessa219/vditor/issues/1133'}
null
{'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d'}
{'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d'}
GHSA
GHSA-g67g-hvc3-xmvf
Inconsistent input sanitisation leads to XSS vectors
### Background A variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of XSS possibilities with specially crafted input to a variety of fields. ### Impact OMERO.web before 5.11.0 and OMERO.figure before 4.4...
{'CVE-2021-41132'}
2022-03-22T21:24:34Z
2021-10-14T21:19:23Z
CRITICAL
9.8
{'CWE-116', 'CWE-79'}
{'https://github.com/ome/omero-web/security/advisories/GHSA-g67g-hvc3-xmvf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41132', 'https://www.openmicroscopy.org/security/advisories/2021-SV3/', 'https://github.com/advisories/GHSA-g67g-hvc3-xmvf', 'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae9...
null
{'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424'}
{'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424'}
GHSA
GHSA-qv7g-j98v-8pp7
XSS vulnerability on email template preview page
### Summary Email template preview is vulnerable to XSS payload added to email template content. The attacker should have permission to create or edit an email template. For successful payload, execution attacked user should preview a vulnerable email template. ### Workarounds There are no workarounds that address t...
{'CVE-2021-41236'}
2022-01-06T19:49:02Z
2022-01-06T18:34:35Z
MODERATE
6.9
{'CWE-79'}
{'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a', 'https://github.com/advisories/GHSA-qv7g-j98v-8pp7', 'https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41236'}
null
{'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'}
{'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'}
GHSA
GHSA-w29m-fjp4-qhmq
Unsafe Identifiers in Opencast
### Impact Opencast allows almost arbitrary identifiers for media packages and elements to be used. This can be problematic for operation and security since such identifiers are sometimes used for file system operations which may lead to an attacker being able to escape working directories and write files to other loc...
{'CVE-2020-5230'}
2021-01-14T17:45:48Z
2020-01-30T21:21:50Z
MODERATE
7.7
{'CWE-99'}
{'https://github.com/advisories/GHSA-w29m-fjp4-qhmq', 'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317', 'https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5230'}
null
{'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317'}
{'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317'}
GHSA
GHSA-2v6x-frw8-7r7f
Exposure of Sensitive Information to an Unauthorized Actor in kube-state-metrics
A security issue was discovered in kube-state-metrics 1.7.x before 1.7.2. An experimental feature was added to v1.7.0 and v1.7.1 that enabled annotations to be exposed as metrics. By default, kube-state-metrics metrics only expose metadata about Secrets. However, a combination of the default kubectl behavior and this n...
{'CVE-2019-17110'}
2021-05-18T15:38:54Z
2021-05-18T15:38:54Z
MODERATE
6.5
{'CWE-200'}
{'https://github.com/kubernetes/kube-state-metrics/commit/2a9ab3a9a0f1c4dbecb6a5577185b33bfac86a96', 'https://github.com/kubernetes/kube-state-metrics/releases/tag/v1.7.2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17110', 'https://github.com/advisories/GHSA-2v6x-frw8-7r7f', 'https://github.com/kubernetes/kube-state-m...
null
{'https://github.com/kubernetes/kube-state-metrics/commit/2a9ab3a9a0f1c4dbecb6a5577185b33bfac86a96', 'https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f'}
{'https://github.com/kubernetes/kube-state-metrics/commit/2a9ab3a9a0f1c4dbecb6a5577185b33bfac86a96', 'https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f'}
GHSA
GHSA-q8q8-93cv-v6h8
Lookup function information discolosure in helm
The Helm core maintainers have identified an information disclosure vulnerability in Helm 3.0.0-3.1.2. ### Impact `lookup` is a Helm template function introduced in Helm v3. It is able to lookup resources in the cluster to check for the existence of specific resources and get details about them. This can be used as ...
{'CVE-2020-11013'}
2021-05-27T18:44:56Z
2021-05-27T18:44:56Z
HIGH
8.5
{'CWE-200'}
{'https://github.com/helm/helm/releases/tag/v3.2.0', 'https://github.com/helm/helm/pull/7969', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11013', 'https://github.com/helm/helm/pull/7969/commits/c67b644a791a8fa61c760a3a0474533e63e74008', 'https://github.com/helm/helm/security/advisories/GHSA-q8q8-93cv-v6h8', 'https://gi...
null
{'https://github.com/helm/helm/pull/7969/commits/c67b644a791a8fa61c760a3a0474533e63e74008'}
{'https://github.com/helm/helm/pull/7969/commits/c67b644a791a8fa61c760a3a0474533e63e74008'}
GHSA
GHSA-xr38-w74q-r8jv
Permissions not properly checked in Invenio-Drafts-Resources
### Impact Invenio-Drafts-Resources does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validat...
{'CVE-2021-43781'}
2022-04-19T19:03:16Z
2021-12-06T23:57:59Z
MODERATE
6.4
{'CWE-862'}
{'https://github.com/inveniosoftware/invenio-drafts-resources/security/advisories/GHSA-xr38-w74q-r8jv', 'https://github.com/advisories/GHSA-xr38-w74q-r8jv', 'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43781'}
null
{'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626'}
{'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626'}
GHSA
GHSA-4j82-5ccr-4r8v
`CHECK`-failures in `TensorByteSize` in Tensorflow
### Impact A malicious user can cause a denial of service by altering a `SavedModel` such that [`TensorByteSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.cc#L46-L50) would trigger `CHECK` failures. ```cc int64_t TensorByteSize(con...
{'CVE-2022-23582'}
2022-02-11T20:38:32Z
2022-02-10T00:34:01Z
MODERATE
6.5
{'CWE-617'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23582', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4j82-5ccr-4r8v', 'https://github.com/advisories/GHSA-4j82-5ccr-4r8v', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.c...
null
{'https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02'}
{'https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02'}
GHSA
GHSA-8mrf-64fw-2x75
Command injection in fs-path
fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods.
{'CVE-2020-8298'}
2021-03-25T21:06:41Z
2021-03-25T21:06:41Z
CRITICAL
9.8
{'CWE-77'}
{'https://hackerone.com/reports/324491', 'https://github.com/pillys/fs-path/pull/6', 'https://github.com/advisories/GHSA-8mrf-64fw-2x75', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8298', 'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7'}
null
{'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7'}
{'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7'}
GHSA
GHSA-h353-hc43-95vc
Script injection without script or programming rights through Gadget titles
### Impact A user without Script or Programming right is able to execute script requiring privileges by editing gadget titles in the dashboard. ### Patches The issue has been patched in XWiki 12.6.7, 12.10.3 and 13.0RC1. ### Workarounds There's no easy workaround for this issue, it is recommended to upgrade XWiki. #...
{'CVE-2021-32621'}
2021-06-28T18:40:55Z
2021-05-18T18:36:16Z
HIGH
8.8
{'CWE-94'}
{'https://jay-from-future.github.io/cve/2021/06/17/xwiki-rce-cve.html', 'https://jira.xwiki.org/browse/XWIKI-17794', 'https://github.com/advisories/GHSA-h353-hc43-95vc', 'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32621', 'https:/...
null
{'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc'}
{'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc'}
GHSA
GHSA-w285-wf9q-5w69
In Bouncy Castle JCE Provider the ECIES implementation allowed the use of ECB mode
In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.
{'CVE-2016-1000352'}
2022-04-27T13:36:22Z
2018-10-17T16:27:38Z
HIGH
7.4
{'CWE-326'}
{'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000352', 'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://gith...
null
{'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'}
{'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'}
GHSA
GHSA-xfhh-g9f5-x4m4
Resource exhaustion in socket.io-parser
The `socket.io-parser` npm package before versions 3.3.2 and 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used.
{'CVE-2020-36049'}
2021-06-30T16:54:43Z
2021-06-30T16:51:31Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55', 'https://github.com/advisories/GHSA-xfhh-g9f5-x4m4', 'https://github.com/bcaller/kill-engine-io', 'https://github.com/socketio/socket.io-parser/releases/tag/3.4.1', 'https://blog.caller.xyz/socketio-engineio-dos/', 'https:/...
null
{'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55'}
{'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55'}
GHSA
GHSA-8g7p-74h8-hg48
Denial of Service in https-proxy-agent
Versions of `https-proxy-agent` before 2.2.0 are vulnerable to denial of service. This is due to unsanitized options (proxy.auth) being passed to `Buffer()`. ## Recommendation Update to version 2.2.0 or later.
{'CVE-2018-3739'}
2022-04-19T19:03:26Z
2018-07-27T17:04:52Z
CRITICAL
9.1
{'CWE-400', 'CWE-125'}
{'https://www.npmjs.com/advisories/593', 'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07', 'https://github.com/advisories/GHSA-8g7p-74h8-hg48', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3736', 'https://hackerone.com/reports/319532'}
null
{'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07'}
{'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07'}
GHSA
GHSA-qxg5-2qff-p49r
Passing in a non-string 'html' argument can lead to unsanitized output
A type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function. ### Impact XSS ### Patche...
{'CVE-2021-32696'}
2022-04-19T19:02:59Z
2021-06-18T19:31:35Z
MODERATE
3.7
{'CWE-241', 'CWE-79', 'CWE-843'}
{'https://www.npmjs.com/package/striptags', 'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca', 'https://github.com/ericnorris/striptags/releases/tag/v3.2.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32696', 'https://github.com/advisories/GHSA-qxg5-2qff-p49r', 'https://github.co...
null
{'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca'}
{'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca'}
GHSA
GHSA-c8xp-8mf3-62h9
OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values
Any CA issuer in the RPKI can trick OctoRPKI prior to https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 into emitting an invalid VRP "MaxLength" value, causing RTR sessions to terminate. ### Impact An attacker can use this to disable RPKI Origin Validation in a victim network (for ...
{'CVE-2021-3761'}
2022-04-19T19:03:07Z
2021-09-07T23:02:18Z
HIGH
7.5
{'CWE-787', 'CWE-295'}
{'https://www.debian.org/security/2022/dsa-5041', 'https://github.com/cloudflare/cfrpki/releases/tag/v1.3.0', 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-c8xp-8mf3-62h9', 'https://github.com/advisories/GHSA-c8xp-8mf3-62h9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3761', 'https://github.com/cloudfl...
null
{'https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422'}
{'https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422'}
GHSA
GHSA-86f3-hf24-76q4
Use of Hard-coded Cryptographic Key in Netmaker
### Impact There is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server, if you know the address and username of the admin. This effects the server (netmaker) component, and not clients. ### Patches This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10....
{'CVE-2022-23650'}
2022-04-19T19:03:24Z
2022-02-22T19:40:23Z
HIGH
7.2
{'CWE-798', 'CWE-321'}
{'https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee', 'https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23650', 'https://github.com/gravitl/netmaker/security/advisories/GHSA-86f3-hf24-76q4', 'https://github...
null
{'https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee', 'https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87', 'https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080'}
{'https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87', 'https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee', 'https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080'}
GHSA
GHSA-99cg-575x-774p
Improper Input Validation in AKPublic.Verify with attacker-controlled TPM Quote
### Impact An improper input validation vulnerability in go-attestation before 0.4.0 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing `AKPublic.Verify` to succeed despite the inconsistency. Subsequent use of the same set of PCR values in `Eventlog.Verify` lacks the authentication per...
{'CVE-2022-0317'}
2022-04-19T19:03:20Z
2022-02-01T00:43:17Z
MODERATE
4
{'CWE-20'}
{'https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788', 'https://github.com/advisories/GHSA-99cg-575x-774p', 'https://github.com/google/go-attestation/security/advisories/GHSA-99cg-575x-774p', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0317'}
null
{'https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788'}
{'https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788'}
GHSA
GHSA-g4c2-ghfg-g5rh
Cross-site Scripting and Open Redirect in Products.ATContentTypes
### Impact Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on this page. Us...
{'CVE-2022-23599'}
2022-02-07T21:16:59Z
2022-01-28T23:10:37Z
MODERATE
4.3
{'CWE-79'}
{'https://github.com/advisories/GHSA-g4c2-ghfg-g5rh', 'https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh', 'https://github.com/plone/Products.ATContentTypes/commit/fc793f88f35a15a68b52e4abed77af0da5fdbab8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23599'}
null
{'https://github.com/plone/Products.ATContentTypes/commit/fc793f88f35a15a68b52e4abed77af0da5fdbab8'}
{'https://github.com/plone/Products.ATContentTypes/commit/fc793f88f35a15a68b52e4abed77af0da5fdbab8'}
GHSA
GHSA-pw59-4qgf-jxr8
Cache Manipulation Attack in Apache Traffic Control
When ORT (now via atstccfg) generates ip_allow.config files in Apache Traffic Control 3.0.0 to 3.1.0 and 4.0.0 to 4.1.0, those files include permissions that allow bad actors to push arbitrary content into and remove arbitrary content from CDN cache servers. Additionally, these permissions are potentially extended to I...
{'CVE-2020-17522'}
2022-04-12T22:17:55Z
2021-12-16T19:20:21Z
MODERATE
5.8
{'CWE-732', 'CWE-525'}
{'https://lists.apache.org/thread.html/r3de212a3da73bcf98fa2db7eafb75b2eb8e131ff466e6efc4284df09%40%3Cdev.trafficcontrol.apache.org%3E', 'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b', 'https://lists.apache.org/thread.html/rc8bfd7d4f71d61e9193efcd4699eccbab3c202ec1d75ed9d502f...
null
{'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b'}
{'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b'}
GHSA
GHSA-8v63-cqqc-6r2c
Prototype Pollution in object-path
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3805'}
2022-04-19T19:03:28Z
2021-09-20T20:46:43Z
HIGH
7.5
{'CWE-1321', 'CWE-915'}
{'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3805', 'https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053', 'https://github.com/advisories/GHSA-8v63-cqqc-6r2c'}
null
{'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884'}
{'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884'}
GHSA
GHSA-w7q9-p3jq-fmhm
Uncontrolled resource consumption in jpeg-js
Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.
{'CVE-2020-8175'}
2021-01-07T23:46:38Z
2020-07-27T15:46:57Z
MODERATE
0
{'CWE-400'}
{'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79', 'https://github.com/advisories/GHSA-w7q9-p3jq-fmhm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8175', 'https://hackerone.com/reports/842462'}
null
{'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79'}
{'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79'}
GHSA
GHSA-mxjj-953w-2c2v
Data corruption in tensorflow-lite
### Impact When determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/types.h#L437-L442 Since the function always returns the...
{'CVE-2020-15208'}
2021-08-26T15:16:48Z
2020-09-25T18:28:44Z
HIGH
7.4
{'CWE-787', 'CWE-125'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-mxjj-953w-2c2v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15208', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mxjj-953w-2c2v', 'https://github.com/tensorflow/tensorflow/commit/8ee2...
null
{'https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d'}
{'https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d'}
GHSA
GHSA-579x-cjvr-cqj9
Observable Response Discrepancy in Lost Password Service
### Impact It is possible to enumerate usernames via the forgot password functionality ### Patches Update to version `10.1.3` or apply this patch manually: https://github.com/pimcore/pimcore/pull/10223.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/10223.patch manually.
{'CVE-2021-39189'}
2021-09-28T19:05:38Z
2021-09-20T19:53:55Z
MODERATE
5.3
{'CWE-204', 'CWE-203'}
{'https://github.com/pimcore/pimcore/pull/10223.patch', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39189', 'https://github.com/advisories/GHSA-579x-cjvr-cqj9', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9', 'https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/', 'https://githu...
null
{'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'}
{'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'}
GHSA
GHSA-vqw6-72r7-fgw7
OOB read in `MatrixTriangularSolve`
### Impact The implementation of [`MatrixTriangularSolve`](https://github.com/tensorflow/tensorflow/blob/8cae746d8449c7dda5298327353d68613f16e798/tensorflow/core/kernels/linalg/matrix_triangular_solve_op_impl.h#L160-L240) fails to terminate kernel execution if one validation condition fails: ```cc void ValidateInputTe...
{'CVE-2021-29551'}
2021-05-21T14:23:44Z
2021-05-21T14:23:44Z
LOW
2.5
{'CWE-125'}
{'https://github.com/advisories/GHSA-vqw6-72r7-fgw7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29551', 'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vqw6-72r7-fgw7'}
null
{'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68'}
{'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68'}
GHSA
GHSA-h47j-hc6x-h3qq
Remote Code Execution Vulnerability in NPM mongo-express
### Impact Remote code execution on the host machine by any authenticated user. ### Proof Of Concept Launching mongo-express on a Mac, pasting the following into the "create index" field will pop open the Mac calculator: ```javascript this.constructor.constructor("return process")().mainModule.require('child_proces...
{'CVE-2019-10758'}
2022-04-19T19:02:23Z
2019-12-30T19:30:31Z
HIGH
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10758', 'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494', 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq', 'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215', 'https://github.com/advisori...
null
{'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494'}
{'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494'}
GHSA
GHSA-mjww-934m-h4jw
Improper Certificate Validation in OPCFoundation.NetStandard.Opc.Ua
A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates.
{'CVE-2020-29457'}
2021-11-19T20:19:53Z
2021-11-19T20:19:53Z
MODERATE
4.4
{'CWE-295'}
{'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229', 'https://github.com/advisories/GHSA-mjww-934m-h4jw', 'https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/', 'https://nvd.nist.gov/vuln/de...
null
{'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25'}
{'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25'}
GHSA
GHSA-mr6r-82x4-f4jj
Timing attacks might allow practical recovery of the long-term private key
In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical...
{'CVE-2019-10764'}
2021-08-18T22:40:49Z
2019-11-20T01:34:50Z
HIGH
7.4
{'CWE-203'}
{'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9', 'https://snyk.io/vuln/SNYK-PHP-SIMPLITOELLIPTICPHP-534576', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764', 'https://github.com/advisories/GHSA-mr6r-82x4-f4jj', 'https://minerva.crocs.fi.muni.cz/'}
null
{'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'}
{'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'}
GHSA
GHSA-r53w-g4xm-3gc6
Cross-site scripting in Haml
In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code.
{'CVE-2017-1002201'}
2022-01-04T19:39:12Z
2019-10-21T21:59:13Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.debian.org/debian-lts-announce/2019/11/msg00007.html', 'https://snyk.io/vuln/SNYK-RUBY-HAML-20362', 'https://github.com/advisories/GHSA-r53w-g4xm-3gc6', 'https://security.gentoo.org/glsa/202007-27', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002201', 'https://github.com/haml/haml/commit/18576ae6e9bdcb4...
null
{'https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2'}
{'https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2'}
GHSA
GHSA-786j-5qwq-r36x
Segfault while copying constant resource tensor
### Impact During TensorFlow's Grappler optimizer phase, constant folding might attempt to deep copy a resource tensor. This results in a segfault, as these tensors are supposed to not change. ### Patches We have patched the issue in GitHub commit [7731e8dfbe4a56773be5dc94d631611211156659](https://github.com/tensorflo...
{'CVE-2021-41204'}
2021-11-10T19:12:14Z
2021-11-10T19:12:14Z
MODERATE
5.5
{'CWE-824'}
{'https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659', 'https://github.com/advisories/GHSA-786j-5qwq-r36x', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-786j-5qwq-r36x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41204'}
null
{'https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659'}
{'https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659'}
GHSA
GHSA-mxh3-2699-98g9
Cross-site Scripting pimcore
pimcore version 10.3.0 and prior is vulnerable to cross-site scripting.
{'CVE-2022-0510'}
2022-02-14T22:35:04Z
2022-02-09T00:00:28Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-mxh3-2699-98g9', 'https://huntr.dev/bounties/bb3525d5-dedc-48b8-ab04-ad4c72499abe', 'https://github.com/pimcore/pimcore/commit/b5a9ad65e5a4dde1916f02019f8686ad835681ce', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0510'}
null
{'https://github.com/pimcore/pimcore/commit/b5a9ad65e5a4dde1916f02019f8686ad835681ce'}
{'https://github.com/pimcore/pimcore/commit/b5a9ad65e5a4dde1916f02019f8686ad835681ce'}
GHSA
GHSA-pjh3-jv7w-9jpr
Command Injection in gm
Versions of `gm` prior to 1.21.1 are affected by a command injection vulnerability. The vulnerability is triggered when user input is passed into `gm.compare()`, which fails to sanitize input correctly before calling the graphics magic binary. ## Recommendation Update to version 1.21.1 or later.
{'CVE-2015-7982'}
2021-09-23T21:23:49Z
2020-09-01T15:18:55Z
CRITICAL
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-pjh3-jv7w-9jpr', 'https://www.npmjs.com/advisories/54', 'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7982'}
null
{'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31'}
{'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31'}
GHSA
GHSA-gj85-pvp5-mvf9
Cross-site Scripting in Beanstalk console
Beanstalk console prior to version 1.7.12 is vulnerable to cross-site scripting.
{'CVE-2022-0501'}
2022-02-14T22:30:43Z
2022-02-06T00:00:54Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/ptrofimov/beanstalk_console/commit/e351c8260ec1d3718d9e475ee57c7e12c47f19da', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0501', 'https://huntr.dev/bounties/9af1c35e-3f74-4c93-a241-e8be01335ec7', 'https://github.com/advisories/GHSA-gj85-pvp5-mvf9'}
null
{'https://github.com/ptrofimov/beanstalk_console/commit/e351c8260ec1d3718d9e475ee57c7e12c47f19da'}
{'https://github.com/ptrofimov/beanstalk_console/commit/e351c8260ec1d3718d9e475ee57c7e12c47f19da'}
GHSA
GHSA-pr3h-jjhj-573x
High severity vulnerability that affects sprockets
Specially crafted requests can be used to access files that exist on the filesystem that is outside an application's root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately. Workaround: In Rails appl...
{'CVE-2018-3760'}
2021-12-02T20:12:00Z
2018-06-20T22:18:58Z
HIGH
7.5
{'CWE-200', 'CWE-22'}
{'https://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441', 'https://www.debian.org/security/2018/dsa-4242', 'https://access.redhat.com/errata/RHSA-2018:2561', 'https://access.redhat.com/errata/RHSA-2018:2244', 'https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb...
null
{'https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5f', 'https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5', 'https://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441'}
{'https://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441', 'https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5', 'https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5f'}
GHSA
GHSA-4fc4-4p5g-6w89
Cross-site Scripting in CKEditor4
### Affected packages The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4. ### Impact A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML bypassing content sanitiza...
{'CVE-2022-24728'}
2022-03-31T20:51:26Z
2022-03-16T22:47:55Z
MODERATE
5.4
{'CWE-79'}
{'https://securitylab.github.com/advisories/GHSL-2022-009_ckeditor4/', 'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949', 'https://ckeditor.com/cke4/release/CKEditor-4.18.0', 'https://github.com/advisories/GHSA-4fc4-4p5g-6w89', 'https://github.com/ckeditor/ckeditor4/security/adviso...
null
{'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949'}
{'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949'}
GHSA
GHSA-5q2r-92f9-4m49
Improper verification of signature threshold in tough
## Impact The tough library, prior to 0.7.1, does not properly verify the uniqueness of keys in the signatures provided to meet the threshold of cryptographic signatures. It allows someone with access to a valid signing key to create multiple valid signatures in order to circumvent TUF requiring a minimum threshold of...
{'CVE-2020-15093'}
2022-04-19T19:02:29Z
2021-08-25T20:56:55Z
HIGH
8.6
{'CWE-347'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0024.html', 'https://github.com/awslabs/tough/security/advisories/GHSA-5q2r-92f9-4m49', 'https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15093', 'https://github.com/theupdateframework/tuf...
null
{'https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e'}
{'https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e'}
GHSA
GHSA-428x-9xc2-m8mj
Division by zero in TFLite
### Impact An attacker can craft a TFLite model that would trigger a division by zero in [the implementation of depthwise convolutions](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96). The parameters of the convolution can be user c...
{'CVE-2022-21741'}
2022-02-11T16:20:59Z
2022-02-09T23:47:30Z
MODERATE
6.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-428x-9xc2-m8mj', 'https:...
null
{'https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc'}
{'https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc'}
GHSA
GHSA-82mm-ffjr-h86c
Authorization bypass in Istio
"In Istio 1.5.0 though 1.5.8 and Istio 1.6.0 through 1.6.7, when users specify an AuthorizationPolicy resource with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields, callers will never be denied access, bypassing the intended policy."
{'CVE-2020-16844'}
2022-04-20T21:05:23Z
2022-02-15T01:57:18Z
MODERATE
6.8
{'CWE-284'}
{'https://github.com/advisories/GHSA-82mm-ffjr-h86c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16844', 'https://istio.io/latest/news/security/istio-security-2020-009/', 'https://istio.io/latest/news/releases/1.5.x/announcing-1.5.9/', 'https://github.com/istio/istio/commit/4c73414556b83f0e75c1b3a0a89a23103a71573c', 'h...
null
{'https://github.com/istio/istio/commit/72d2e135374f421b656d6f1a21f474db46134ace', 'https://github.com/istio/istio/commit/4c73414556b83f0e75c1b3a0a89a23103a71573c'}
{'https://github.com/istio/istio/commit/4c73414556b83f0e75c1b3a0a89a23103a71573c', 'https://github.com/istio/istio/commit/72d2e135374f421b656d6f1a21f474db46134ace'}
GHSA
GHSA-49rv-g7w5-m8xx
Cross-Site Scripting in @novnc/novnc
Versions of `@novnc/novnc` prior to 0.6.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to validate input from the remote VNC server such as the VNC server name. This allows an attacker in control of the remote server to execute arbitrary JavaScript in the noVNC web page. It affects any users of `incl...
{'CVE-2017-18635'}
2022-01-04T19:37:09Z
2020-08-28T21:24:59Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html', 'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534', 'https://github.com/novnc/noVNC/issues/748', 'https://access.redhat.com/errata/RHSA-2020:0754', 'https://www.shielder.it/blog...
null
{'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534'}
{'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534'}
GHSA
GHSA-qhx9-7hx7-cp4r
HTTP Request smuggling in bottle
The package bottle before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the serv...
{'CVE-2020-28473'}
2021-04-07T21:05:21Z
2021-04-07T21:05:21Z
MODERATE
6.8
{'CWE-444'}
{'https://snyk.io/vuln/SNYK-PYTHON-BOTTLE-1017108', 'https://github.com/advisories/GHSA-qhx9-7hx7-cp4r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28473', 'https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00019.html', 'https://github.com/b...
null
{'https://github.com/bottlepy/bottle/commit/57a2f22e0c1d2b328c4f54bf75741d74f47f1a6b'}
{'https://github.com/bottlepy/bottle/commit/57a2f22e0c1d2b328c4f54bf75741d74f47f1a6b'}
GHSA
GHSA-xmq3-hgjx-6997
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
{'CVE-2022-0705'}
2022-03-29T21:30:06Z
2022-03-17T00:00:47Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-xmq3-hgjx-6997', 'https://huntr.dev/bounties/0e1b6836-e5b5-4e47-b9ab-2f6a4790ee7b', 'https://github.com/pimcore/pimcore/pull/11447', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0705', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
null
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
GHSA
GHSA-7qqv-r2q4-jxhm
High severity vulnerability that affects privacyIDEA
privacyIDEA version 2.23.1 and earlier contains a Improper Input Validation vulnerability in token validation api that can result in Denial-of-Service. This attack appear to be exploitable via http request with user=<space>&pass= to /validate/check url. This vulnerability appears to have been fixed in 2.23.2.
{'CVE-2018-1000809'}
2021-09-03T21:43:08Z
2019-01-14T16:19:31Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/privacyidea/privacyidea/issues/1227', 'https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751', 'https://github.com/advisories/GHSA-7qqv-r2q4-jxhm', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000809'}
null
{'https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751'}
{'https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751'}
GHSA
GHSA-xmgj-5fh3-xjmm
Path traversal when MessageBus::Diagnostics is enabled
### Impact Users who deployed message bus with diagnostics features enabled (default off) were vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for you...
{'CVE-2021-43840'}
2022-01-03T15:46:44Z
2021-12-17T19:59:13Z
MODERATE
4.2
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43840', 'https://github.com/advisories/GHSA-xmgj-5fh3-xjmm', 'https://github.com/discourse/message_bus/security/advisories/GHSA-xmgj-5fh3-xjmm', 'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba'}
null
{'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba'}
{'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba'}
GHSA
GHSA-jj4f-p7vv-j4v9
Arbitrary code execution in Apache Druid
Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary c...
{'CVE-2021-26919'}
2021-06-16T17:51:58Z
2021-06-16T17:51:58Z
HIGH
0
{'CWE-668'}
{'https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26919', 'https://lists.apache.org/thread.html/r7a531ec123570cb7875ff991cf115f99e9ef99a48b3cf3fa4f9d9864@%3Ccommits.druid.apache.org%3E', 'https://git...
null
{'https://github.com/apache/druid/commit/48953e3508967f5156c69676432b5d4dd25ea678'}
{'https://github.com/apache/druid/commit/48953e3508967f5156c69676432b5d4dd25ea678'}
GHSA
GHSA-xvjm-fvxx-q3hv
CHECK-fail due to integer overflow
### Impact An attacker can trigger a denial of service via a `CHECK`-fail in caused by an integer overflow in constructing a new tensor shape: ```python import tensorflow as tf input_layer = 2**60-1 sparse_data = tf.raw_ops.SparseSplit( split_dim=1, indices=[(0, 0), (0, 1), (0, 2), (4, 3), (5, 0), (5, ...
{'CVE-2021-29584'}
2021-05-21T14:26:38Z
2021-05-21T14:26:38Z
LOW
2.5
{'CWE-190'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29584', 'https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xvjm-fvxx-q3hv', 'https://github.com/advisories/GHSA-xvjm-fvxx-q3hv'}
null
{'https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60'}
{'https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60'}
GHSA
GHSA-xwg4-93c6-3h42
Directory Traversal in send
Versions 0.8.3 and earlier of `send` are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory. For example, `static(_dirname + '/...
{'CVE-2014-6394'}
2021-09-22T17:58:57Z
2017-10-24T18:33:36Z
LOW
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-xwg4-93c6-3h42', 'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a', 'http://www.securityfocus.com/bid/70100', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=114606...
null
{'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a'}
{'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a'}
GHSA
GHSA-r5cq-9537-9rpf
Prototype Pollution in mixme
Node.js mixme 0.5.0, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
{'CVE-2021-28860'}
2022-02-10T23:52:01Z
2022-02-10T23:52:01Z
CRITICAL
9.1
{'CWE-1321'}
{'http://nodejs.com', 'https://www.npmjs.com/~david', 'https://github.com/adaltas/node-mixme/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28860', 'https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9...
null
{'https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028'}
{'https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028'}
GHSA
GHSA-cpv8-6xgr-rmf6
Cross-site Scripting in Dolibarr
In “Dolibarr ERP CRM”, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the “Private Note” field at “/adherents/note.php?id=1” endpoint. These scripts are executed in a victim’s browser when they open the page ...
{'CVE-2021-25955'}
2021-10-21T14:19:19Z
2021-08-30T16:22:46Z
CRITICAL
9
{'CWE-79'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25955', 'https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25955', 'https://github.com/advisories/GHSA-cpv8-6xgr-rmf6'}
null
{'https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e'}
{'https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e'}
GHSA
GHSA-7c7g-72q7-4xhm
Prototype pollution vulnerability in 'deepref'
Prototype pollution vulnerability in 'deepref' versions 1.1.1 through 1.2.1 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28274'}
2021-10-12T16:27:35Z
2021-10-12T16:27:35Z
CRITICAL
9.8
null
{'https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28274', 'https://github.com/advisories/GHSA-7c7g-72q7-4xhm', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28274'}
null
{'https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2'}
{'https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2'}
GHSA
GHSA-xh9g-cp3v-p8q4
Missing Authorization in Crater Invoice
Crater Invoice prior to version 6.0.2 has a missing authorization vulnerability..
{'CVE-2022-0203'}
2022-02-10T22:25:36Z
2022-01-27T00:01:17Z
MODERATE
5.3
{'CWE-862', 'CWE-284'}
{'https://github.com/crater-invoice/crater/commit/dd324c8bb6b17009f82afe8bc830caec7241e992', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0203', 'https://huntr.dev/bounties/395fc553-2b90-4e69-ba07-a316e1c06406', 'https://github.com/advisories/GHSA-xh9g-cp3v-p8q4'}
null
{'https://github.com/crater-invoice/crater/commit/dd324c8bb6b17009f82afe8bc830caec7241e992'}
{'https://github.com/crater-invoice/crater/commit/dd324c8bb6b17009f82afe8bc830caec7241e992'}
GHSA
GHSA-xrx6-fmxq-rjj2
Timing attacks in python-rsa
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.
{'CVE-2020-25658'}
2021-09-27T18:38:48Z
2021-04-30T17:35:15Z
MODERATE
5.9
{'CWE-327', 'CWE-385'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25658', 'https://github.com/sybrenstuvel/python-rsa/commit/dae8ce0d85478e16f2368b2341632775313d41ed', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658', 'https://github.com/advisories/GHSA-xrx6-fmxq-rjj2', 'https://github.com/sybrenstuvel/python-rsa/issues/165', 'h...
null
{'https://github.com/sybrenstuvel/python-rsa/commit/dae8ce0d85478e16f2368b2341632775313d41ed'}
{'https://github.com/sybrenstuvel/python-rsa/commit/dae8ce0d85478e16f2368b2341632775313d41ed'}
GHSA
GHSA-9534-h433-2rjf
Improperly Controlled Modification of Dynamically-Determined Object Attributes in utilitify
utilitify prior to 1.0.3 allows modification of object properties. The merge method could be tricked into adding or modifying properties of the Object.prototype.
{'CVE-2019-10808'}
2021-07-28T18:40:29Z
2021-05-07T16:28:47Z
HIGH
8.8
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-UTILITIFY-559497', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10808', 'https://github.com/advisories/GHSA-9534-h433-2rjf', 'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'}
null
{'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'}
{'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'}
GHSA
GHSA-3329-pjwv-fjpg
Hostname spoofing via backslashes in URL
### Impact If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a backslash (`\`) character followed by an at (`@`) character. If the hostname is used in security decisions, the decision may be incorrect. Depending on library usage and attacker intent, impacts may include allo...
{'CVE-2020-26291'}
2022-04-19T19:02:43Z
2020-12-30T23:40:48Z
MODERATE
6.5
{'CWE-20'}
{'https://www.npmjs.com/package/urijs', 'https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155', 'https://github.com/advisories/GHSA-3329-pjwv-fjpg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26291', 'https://github.com/medialize/URI.js/releases/tag/v1.19.4', 'https://www.npmjs.com/adviso...
null
{'https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155'}
{'https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155'}