ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-6p56-wp2h-9hxr
Buffer Overflow in NumPy
A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service.
{'CVE-2021-33430'}
2022-02-08T20:09:25Z
2022-01-07T00:09:39Z
MODERATE
5.3
{'CWE-120'}
{'https://github.com/advisories/GHSA-6p56-wp2h-9hxr', 'https://github.com/numpy/numpy/issues/18939', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33430', 'https://github.com/numpy/numpy/commit/ae317fd9ff3e79c0eac357d723bfc29cbd625f2e'}
null
{'https://github.com/numpy/numpy/commit/ae317fd9ff3e79c0eac357d723bfc29cbd625f2e'}
{'https://github.com/numpy/numpy/commit/ae317fd9ff3e79c0eac357d723bfc29cbd625f2e'}
GHSA
GHSA-vgrx-w6rg-8fqf
Forgeable Public/Private Tokens in jwt-simple
Affected versions of the `jwt-simple` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authent...
{'CVE-2016-10555'}
2021-01-08T01:57:18Z
2018-11-06T23:12:07Z
CRITICAL
0
{'CWE-20'}
{'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97', 'https://github.com/advisories/GHSA-vgrx-w6rg-8fqf', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10555', 'https://www.npmjs.com/adviso...
null
{'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97'}
{'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97'}
GHSA
GHSA-fx5c-h9f6-rv7c
`CHECK`-fails due to attempting to build a reference tensor
### Impact A malicious user can cause a denial of service by altering a `SavedModel` such that [Grappler optimizer would attempt to build a tensor using a reference `dtype`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L13...
{'CVE-2022-23588'}
2022-02-11T20:01:09Z
2022-02-09T23:28:07Z
MODERATE
6.5
{'CWE-617'}
{'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1328-L1402', 'https://github.com/advisories/GHSA-fx5c-h9f6-rv7c', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/fram...
null
{'https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6'}
{'https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6'}
GHSA
GHSA-7x7c-qm48-pq9c
Cross-site Scripting in karma
karma prior to version 6.3.14 contains a cross-site scripting vulnerability.
{'CVE-2022-0437'}
2022-02-11T19:59:48Z
2022-02-06T00:00:54Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/karma-runner/karma/releases/tag/v6.3.14', 'https://huntr.dev/bounties/64b67ea1-5487-4382-a5f6-e8a95f798885', 'https://github.com/karma-runner/karma/commit/839578c45a8ac42fbc1d72105f97eab77dd3eb8a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0437', 'https://github.com/advisories/GHSA-7x7c-qm48-pq9c'...
null
{'https://github.com/karma-runner/karma/commit/839578c45a8ac42fbc1d72105f97eab77dd3eb8a'}
{'https://github.com/karma-runner/karma/commit/839578c45a8ac42fbc1d72105f97eab77dd3eb8a'}
GHSA
GHSA-gf88-j2mg-cc82
Crash caused by integer conversion to unsigned
### Impact An attacker can cause a denial of service in `boosted_trees_create_quantile_stream_resource` by using negative arguments: ```python import tensorflow as tf from tensorflow.python.ops import gen_boosted_trees_ops import numpy as np v= tf.Variable([0.0, 0.0, 0.0, 0.0, 0.0]) gen_boosted_trees_ops.boosted_tree...
{'CVE-2021-37661'}
2021-08-25T14:42:28Z
2021-08-25T14:42:28Z
MODERATE
5.5
{'CWE-681'}
{'https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37661', 'https://github.com/advisories/GHSA-gf88-j2mg-cc82', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf88-j2mg-cc82'}
null
{'https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992'}
{'https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992'}
GHSA
GHSA-r56q-vv3c-6g9c
Improper sanitization of delegated role names
### Impact The tough library, prior to 0.12.0, does not properly sanitize delegated role names when caching a repository, or when loading a repository from the filesystem. When the repository is cached or loaded, files ending with the .json extension could be overwritten with role metadata anywhere on the system. AWS ...
{'CVE-2021-41150'}
2021-10-20T15:38:21Z
2021-10-19T20:16:26Z
HIGH
8.2
{'CWE-22'}
{'https://github.com/advisories/GHSA-r56q-vv3c-6g9c', 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41150', 'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a', 'https://github.com/awslabs/tough/secur...
null
{'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'}
{'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'}
GHSA
GHSA-pfjj-m3jj-9jc9
Undefined behavior in `SparseTensorSliceDataset`
### Impact The [implementation of `SparseTensorSliceDataset`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L227-L292) has an undefined behavior: under certain condition it can be made to dereference a `nullptr` val...
{'CVE-2022-21736'}
2022-02-11T16:24:04Z
2022-02-09T23:43:27Z
HIGH
7.6
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L227-L292', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pfjj-m3jj-9jc9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21736', 'https://github.com/t...
null
{'https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb'}
{'https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb'}
GHSA
GHSA-93p5-8fqw-wjx3
Authentication bypass by capture-replay in github.com/cosmos/ethermint
Cosmos Network Ethermint <= v0.4.0 is affected by a transaction replay vulnerability in the EVM module. If the victim sends a very large nonce transaction, the attacker can replay the transaction through the application.
{'CVE-2021-25834'}
2022-04-12T22:56:36Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-287', 'CWE-294'}
{'https://github.com/cosmos/ethermint/commit/d7bdbd7488644f0aaeee5cdcdc119c863f199f72', 'https://github.com/cosmos/ethermint/releases/tag/v0.4.1', 'https://github.com/advisories/GHSA-93p5-8fqw-wjx3', 'https://github.com/cosmos/ethermint/issues/686', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25834'}
null
{'https://github.com/cosmos/ethermint/commit/d7bdbd7488644f0aaeee5cdcdc119c863f199f72'}
{'https://github.com/cosmos/ethermint/commit/d7bdbd7488644f0aaeee5cdcdc119c863f199f72'}
GHSA
GHSA-qhmp-h54x-38qr
CWE-730 Regex injection with IFTTT Plugin
### Impact Anyone _publicly_ hosting the Apprise library and granting them access to the IFTTT notification service. ### Patches Update to Apprise v0.9.5.1 ```bash # Install Apprise v0.9.5.1 from PyPI pip install apprise==0.9.5.1 ``` The patch to the problem was performed [here](https://github.c...
{'CVE-2021-39229'}
2022-04-19T19:03:09Z
2021-09-20T20:57:02Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39229', 'https://github.com/caronc/apprise/pull/436', 'https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359', 'https://github.com/caronc/apprise/commit/e20fce630d55e4ca9b0a1e325a5fea6997489831', 'https://gith...
null
{'https://github.com/caronc/apprise/commit/e20fce630d55e4ca9b0a1e325a5fea6997489831'}
{'https://github.com/caronc/apprise/commit/e20fce630d55e4ca9b0a1e325a5fea6997489831'}
GHSA
GHSA-cjg2-2fjg-fph4
Integer underflow in Frontier
### Impact A bug in Frontier's MODEXP precompile implementation can cause an integer underflow in certain conditions. This will cause a node crash for debug builds. For release builds (and production WebAssembly binaries), the impact is limited as it can only cause a normal EVM out-of-gas. It is recommended that you a...
{'CVE-2022-21685'}
2022-01-15T00:03:46Z
2022-01-14T21:03:36Z
MODERATE
0
{'CWE-191'}
{'https://github.com/paritytech/frontier/commit/8a93fdc6c9f4eb1d2f2a11b7ff1d12d70bf5a664', 'https://github.com/paritytech/frontier/pull/549', 'https://github.com/advisories/GHSA-cjg2-2fjg-fph4', 'https://github.com/paritytech/frontier/security/advisories/GHSA-cjg2-2fjg-fph4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-...
null
{'https://github.com/paritytech/frontier/commit/8a93fdc6c9f4eb1d2f2a11b7ff1d12d70bf5a664'}
{'https://github.com/paritytech/frontier/commit/8a93fdc6c9f4eb1d2f2a11b7ff1d12d70bf5a664'}
GHSA
GHSA-qm28-7hqv-wg5j
OS Command Injection in ng-packagr
The package ng-packagr before 10.1.1 are vulnerable to Command Injection via the styleIncludePaths option.
{'CVE-2020-7735'}
2021-10-05T16:28:06Z
2021-05-07T16:47:32Z
MODERATE
6.6
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-NGPACKAGR-1012427', 'https://github.com/advisories/GHSA-qm28-7hqv-wg5j', 'https://github.com/ng-packagr/ng-packagr/commit/bda0fff3443301f252930a73fdc8fb9502de596d', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7735'}
null
{'https://github.com/ng-packagr/ng-packagr/commit/bda0fff3443301f252930a73fdc8fb9502de596d'}
{'https://github.com/ng-packagr/ng-packagr/commit/bda0fff3443301f252930a73fdc8fb9502de596d'}
GHSA
GHSA-p5hj-xxfr-pwc3
Code Injection in microweber
Code Injection in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0282'}
2022-01-27T18:32:44Z
2022-01-21T18:02:39Z
HIGH
7.5
{'CWE-94'}
{'https://github.com/advisories/GHSA-p5hj-xxfr-pwc3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0282', 'https://huntr.dev/bounties/8815b642-bd9b-4737-951b-bde7319faedd', 'https://github.com/microweber/microweber/commit/51b5a4e3ef01e587797c0109159a8ad9d2bac77a'}
null
{'https://github.com/microweber/microweber/commit/51b5a4e3ef01e587797c0109159a8ad9d2bac77a'}
{'https://github.com/microweber/microweber/commit/51b5a4e3ef01e587797c0109159a8ad9d2bac77a'}
GHSA
GHSA-vwjj-2852-3765
Cross-Site Scripting in forms
Affected versions of `forms` do not properly escape HTML in generated forms, which may result in cross-site scripting. ## Recommendation Update to version 1.3.0 or later.
{'CVE-2017-16015'}
2021-01-08T01:57:11Z
2018-11-09T17:46:27Z
MODERATE
0
{'CWE-80'}
{'https://github.com/advisories/GHSA-vwjj-2852-3765', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16015', 'https://www.npmjs.com/advisories/158', 'https://nodesecurity.io/advisories/158', 'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d'}
null
{'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d'}
{'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d'}
GHSA
GHSA-7vwg-39h8-8qp8
/user/sessions endpoint allows detecting valid accounts
This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time...
null
2021-03-11T17:42:01Z
2021-03-11T17:42:01Z
HIGH
0
{'CWE-203'}
{'https://github.com/advisories/GHSA-7vwg-39h8-8qp8', 'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-7vwg-39h8-8qp8', 'https://packagist.org/packages/ezsystems/ezplatform-rest', 'https://github.com/ezsystems/ezplatform-rest/commit/e239bba8b154a3b4cf787e29b9f15edf8945d933'}
null
{'https://github.com/ezsystems/ezplatform-rest/commit/e239bba8b154a3b4cf787e29b9f15edf8945d933'}
{'https://github.com/ezsystems/ezplatform-rest/commit/e239bba8b154a3b4cf787e29b9f15edf8945d933'}
GHSA
GHSA-gpqq-952q-5327
XSS in the `of` option of the `.position()` util in jquery-ui
### Impact Accepting the value of the `of` option of the [`.position()`](https://api.jqueryui.com/position/) util from untrusted sources may execute untrusted code. For example, invoking the following code: ```js $( "#element" ).position( { my: "left top", at: "right bottom", of: "<img onerror='window.globalOf=true'...
{'CVE-2021-41184'}
2022-04-22T15:40:38Z
2021-10-26T14:55:12Z
MODERATE
6.5
{'CWE-79'}
{'https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://www.drupal.org/sa-core-2022-001...
null
{'https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280'}
{'https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280'}
GHSA
GHSA-w3j4-76qw-wwjm
Older releases of better_errors open to Cross-Site Request Forgery attack
### Impact better_errors prior to 2.8.0 did not implement CSRF protection for its internal requests. It also did not enforce the correct "Content-Type" header for these requests, which allowed a cross-origin "simple request" to be made without CORS protection. These together left an application with better_errors enabl...
{'CVE-2021-39197'}
2022-04-19T19:03:07Z
2021-09-07T23:08:24Z
MODERATE
6.3
{'CWE-352'}
{'https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39197', 'https://github.com/advisories/GHSA-w3j4-76qw-wwjm', 'https://github.com/BetterErrors/better_errors/pull/474', 'https://github.com/BetterErrors/better_errors/discussions/5...
null
{'https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0'}
{'https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0'}
GHSA
GHSA-7ghq-fvr3-pj2x
Incomplete validation in `MaxPoolGrad`
### Impact An attacker can trigger a denial of service via a segmentation fault in `tf.raw_ops.MaxPoolGrad` caused by missing validation: ```python import tensorflow as tf tf.raw_ops.MaxPoolGrad( orig_input = tf.constant([], shape=[3, 0, 0, 2], dtype=tf.float32), orig_output = tf.constant([], shape=[3, 0, 0, 2]...
{'CVE-2021-37674'}
2021-08-25T14:41:33Z
2021-08-25T14:41:33Z
MODERATE
5.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37674', 'https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7ghq-fvr3-pj2x', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021...
null
{'https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475'}
{'https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475'}
GHSA
GHSA-79mg-4w23-4fqc
Unauthenticated SQL Injection in Cachet
### Impact In Cachet versions through 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. ### Patches The original repository of [h...
{'CVE-2021-39165'}
2022-04-19T19:03:05Z
2021-08-30T16:12:58Z
HIGH
8.1
{'CWE-89', 'CWE-287'}
{'https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6', 'https://github.com/advisories/GHSA-79mg-4w23-4fqc', 'https://github.com/fiveai/Cachet/security/advisories/GHSA-79mg-4w23-4fqc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39165'}
null
{'https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6'}
{'https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6'}
GHSA
GHSA-6rrw-4fm9-rghv
Use of Hard-coded Cryptographic Key in Netmaker
Netmaker prior to versions 0.8.5, 0.9.4, 0.10.0, and 0.10.1 uses a hard-coded cryptographic key.
{'CVE-2022-0664'}
2022-02-26T01:51:36Z
2022-02-19T00:01:36Z
HIGH
8.8
{'CWE-321'}
{'https://huntr.dev/bounties/29898a42-fd4f-4b5b-a8e3-ab573cb87eac', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0664', 'https://github.com/advisories/GHSA-6rrw-4fm9-rghv', 'https://github.com/gravitl/netmaker/commit/9bee12642986cb9534e268447b70e6f0f03c59cf'}
null
{'https://github.com/gravitl/netmaker/commit/9bee12642986cb9534e268447b70e6f0f03c59cf'}
{'https://github.com/gravitl/netmaker/commit/9bee12642986cb9534e268447b70e6f0f03c59cf'}
GHSA
GHSA-9722-rr68-rfpg
Upload whitelisted files to any directory in OctoberCMS
### Impact An attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg, ttf, eot, json, md, less, sass, scss, xml files to any directory of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` p...
{'CVE-2020-5297'}
2022-04-19T19:02:26Z
2020-06-03T21:58:27Z
LOW
3.4
{'CWE-73'}
{'https://github.com/advisories/GHSA-9722-rr68-rfpg', 'https://github.com/octobercms/october/security/advisories/GHSA-9722-rr68-rfpg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5297', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com...
null
{'https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8'}
{'https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8'}
GHSA
GHSA-rrp4-2xx3-mv29
Command injection in gh-ost
Gh-ost version <= 1.1.2 allows users to inject DSN strings via the `-database` parameter. This is a low severity vulnerability as the attacker must have access to the target host or trick an administrator into executing a malicious `gh-ost` command on a host running `gh-ost`, plus network access from host running `gh-...
{'CVE-2022-21687'}
2022-04-19T19:03:19Z
2022-02-01T00:47:33Z
MODERATE
6.8
{'CWE-74', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21687', 'https://github.com/advisories/GHSA-rrp4-2xx3-mv29', 'https://github.com/github/gh-ost/security/advisories/GHSA-rrp4-2xx3-mv29', 'https://github.com/github/gh-ost/commit/a91ab042de013cfd8fbb633763438932d9080d8f'}
null
{'https://github.com/github/gh-ost/commit/a91ab042de013cfd8fbb633763438932d9080d8f'}
{'https://github.com/github/gh-ost/commit/a91ab042de013cfd8fbb633763438932d9080d8f'}
GHSA
GHSA-qmm9-x5gr-4gfm
Open Redirect in hekto
Versions of `hekto` before 0.2.4 are vulnerable to open redirect when a domain name is used as part of the `.html` filename. ## Recommendation Update to version 0.2.4 or later.
{'CVE-2018-3743'}
2021-01-08T01:58:33Z
2018-07-18T21:20:12Z
LOW
0
{'CWE-601'}
{'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46', 'https://github.com/advisories/GHSA-qmm9-x5gr-4gfm', 'https://github.com/herber/hekto/pull/3', 'https://www.npmjs.com/advisories/669', 'https://hackerone.com/reports/320693', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3743'}
null
{'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46'}
{'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46'}
GHSA
GHSA-2pqj-h3vj-pqgw
Cross-Site Scripting in jquery
Affected versions of `jquery` are vulnerable to cross-site scripting. This occurs because the main `jquery` function uses a regular expression to differentiate between HTML and selectors, but does not properly anchor the regular expression. The result is that `jquery` may interpret HTML as selectors when given certain ...
{'CVE-2012-6708'}
2021-09-15T15:21:02Z
2020-09-01T16:41:46Z
HIGH
0
{'CWE-64', 'CWE-79'}
{'http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d', 'https://l...
null
{'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d'}
{'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d'}
GHSA
GHSA-5wmg-j84w-4jj4
Arbitrary File Write via Archive Extraction in mholt/archiver
mholt/archiver golang package before e4ef56d48eb029648b0e895bb0b6a393ef0829c3 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
{'CVE-2018-1002207'}
2022-04-12T22:36:10Z
2022-02-15T01:57:18Z
MODERATE
5.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1002207', 'https://github.com/advisories/GHSA-5wmg-j84w-4jj4', 'https://github.com/mholt/archiver/commit/e4ef56d48eb029648b0e895bb0b6a393ef0829c3', 'https://github.com/snyk/zip-slip-vulnerability', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARCHIVER-50071', 'h...
null
{'https://github.com/mholt/archiver/commit/e4ef56d48eb029648b0e895bb0b6a393ef0829c3'}
{'https://github.com/mholt/archiver/commit/e4ef56d48eb029648b0e895bb0b6a393ef0829c3'}
GHSA
GHSA-r92x-f52r-x54g
regular expression denial of service (ReDoS)
date-and-time is an npm package for manipulating date and time. In date-and-time before version 0.14.2, there a regular expression involved in parsing which can be exploited to to cause a denial of service. This is fixed in version 0.14.2.
{'CVE-2020-26289'}
2021-01-07T22:33:13Z
2020-12-24T20:49:02Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-r92x-f52r-x54g', 'https://github.com/knowledgecode/date-and-time/security/advisories/GHSA-r92x-f52r-x54g', 'https://github.com/knowledgecode/date-and-time/commit/9e4b501eacddccc8b1f559fb414f48472ee17c2a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26289', 'https://www.npmjs.com/pack...
null
{'https://github.com/knowledgecode/date-and-time/commit/9e4b501eacddccc8b1f559fb414f48472ee17c2a'}
{'https://github.com/knowledgecode/date-and-time/commit/9e4b501eacddccc8b1f559fb414f48472ee17c2a'}
GHSA
GHSA-vj62-g63v-f8mf
Validity check missing in Frontier
### Impact In the newly introduced signed Frontier-specific extrinsic for `pallet-ethereum`, a large part of transaction validation logic was only called in transaction pool validation, but not in block execution. Malicious validators can take advantage of this to put invalid transactions into a block. The attack is ...
{'CVE-2021-41138'}
2021-10-14T20:03:54Z
2021-10-13T18:53:38Z
MODERATE
5.3
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41138', 'https://github.com/paritytech/frontier/commit/146bb48849e5393004be5c88beefe76fdf009aba', 'https://github.com/advisories/GHSA-vj62-g63v-f8mf', 'https://github.com/paritytech/frontier/pull/497', 'https://github.com/paritytech/frontier/security/advisories/GHSA-vj62-g63v...
null
{'https://github.com/paritytech/frontier/commit/146bb48849e5393004be5c88beefe76fdf009aba'}
{'https://github.com/paritytech/frontier/commit/146bb48849e5393004be5c88beefe76fdf009aba'}
GHSA
GHSA-x3r5-q6mj-m485
Improper sanitization of target names
### Impact The tough library, prior to 0.12.0, does not properly sanitize target names when caching a repository, or when saving specific targets to an output directory. When targets are cached or saved, files could be overwritten with arbitrary content anywhere on the system. AWS would like to thank https://github.co...
{'CVE-2021-41149'}
2021-10-20T15:39:06Z
2021-10-19T20:16:15Z
HIGH
8.2
{'CWE-22'}
{'https://github.com/awslabs/tough/security/advisories/GHSA-x3r5-q6mj-m485', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41149', 'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a', 'https://github.com/advisories/GHSA-x3r5-q6mj-m485'}
null
{'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'}
{'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'}
GHSA
GHSA-8xjq-8fcg-g5hw
Out-of-bounds Write in Pillow
An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size.
{'CVE-2021-25290'}
2021-12-06T21:37:00Z
2021-03-29T16:35:36Z
HIGH
7.5
{'CWE-787'}
{'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25290', 'https://github.com/python-pillow/Pillow/commit/86f02f7c70862a0954bfe8133736d352db978eaa', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/advisories/GHSA-8xjq-8fcg-g5hw', 'https://li...
null
{'https://github.com/python-pillow/Pillow/commit/86f02f7c70862a0954bfe8133736d352db978eaa'}
{'https://github.com/python-pillow/Pillow/commit/86f02f7c70862a0954bfe8133736d352db978eaa'}
GHSA
GHSA-xgc3-m89p-vr3x
Heap buffer overflow in `Conv2DBackpropFilter`
### Impact An attacker can cause a heap buffer overflow to occur in `Conv2DBackpropFilter`: ```python import tensorflow as tf input_tensor = tf.constant([386.078431372549, 386.07843139643234], shape=[1, 1, 1, 2], dtype=tf.float32) filter_sizes = tf.constant([1, 1, 1, 1], shape=[4], dtype=tf...
{'CVE-2021-29540'}
2021-05-21T14:23:09Z
2021-05-21T14:23:09Z
LOW
2.5
{'CWE-787', 'CWE-120'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xgc3-m89p-vr3x', 'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29540', 'https://github.com/advisories/GHSA-xgc3-m89p-vr3x'}
null
{'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96'}
{'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96'}
GHSA
GHSA-3c45-wgjp-7v9r
A single version of twisted does not respect the trustedRoot setting
Python Twisted 14.0 trustRoot is not respected in HTTP client
{'CVE-2014-7143'}
2021-08-19T16:07:48Z
2019-12-17T22:52:34Z
HIGH
7.5
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-7143', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96135', 'https://github.com/twisted/twisted/commit/3b5942252f5f3e45862a0e12b266ab29e243cc33', 'https://security-tracker.debian.org/tracker/CVE-2014-7143', 'http://www.openwall.com/lists/oss-security/2014/09/22/2', '...
null
{'https://github.com/twisted/twisted/commit/3b5942252f5f3e45862a0e12b266ab29e243cc33'}
{'https://github.com/twisted/twisted/commit/3b5942252f5f3e45862a0e12b266ab29e243cc33'}
GHSA
GHSA-77gc-v2xv-rvvh
Out-of-bounds Read in Pillow
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la.
{'CVE-2021-25287'}
2022-03-03T21:47:12Z
2021-06-08T18:49:02Z
CRITICAL
9.1
{'CWE-125'}
{'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25287', 'https://github.com/python-pillow/Pillow/pull/5377/commits/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87', 'https://github.com/python-pillow/Pillow...
null
{'https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87', 'https://github.com/python-pillow/Pillow/pull/5377/commits/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87'}
{'https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87', 'https://github.com/python-pillow/Pillow/pull/5377/commits/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87'}
GHSA
GHSA-xh2p-7p87-fhgh
Incorrect TCR calculation in batchLiquidateTroves() during Recovery Mode
TCR is temporarily miscalculated in the `batchLiquidateTroves` function during Recovery Mode. The bug lies in [`batchLiquidateTroves` of `TroveManager`](https://github.com/liquity/dev/blob/7c83ea11378454629618b3808b16fbfda69ee3e5/packages/contracts/contracts/TroveManager.sol#L722). When calculating system's entire c...
null
2021-08-05T16:56:58Z
2021-08-05T16:56:58Z
LOW
3.1
{'CWE-682'}
{'https://github.com/liquity/dev/security/advisories/GHSA-xh2p-7p87-fhgh', 'https://github.com/liquity/dev/commit/c69d0bae30b5457e89724d880851a03ba7477905', 'https://github.com/advisories/GHSA-xh2p-7p87-fhgh', 'https://www.npmjs.com/package/@liquity/contracts', 'https://github.com/liquity/dev/blob/7c83ea11378454629618b...
null
{'https://github.com/liquity/dev/commit/c69d0bae30b5457e89724d880851a03ba7477905'}
{'https://github.com/liquity/dev/commit/c69d0bae30b5457e89724d880851a03ba7477905'}
GHSA
GHSA-rp2c-jrgp-cvr8
Code injection in plupload
This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.
{'CVE-2021-23562'}
2021-12-16T15:32:31Z
2021-12-16T15:32:31Z
MODERATE
4.2
{'CWE-434', 'CWE-75'}
{'https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb', 'https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909', 'https://github.com/advisories/GHSA-rp2c-jrgp-cvr8', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2306663', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23562', 'https://snyk.io/vu...
null
{'https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb'}
{'https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb'}
GHSA
GHSA-75p6-52g3-rqc8
Privilege escalation vulnerability on Token Exchange feature
A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
{'CVE-2022-1245'}
2022-05-02T19:51:27Z
2022-04-26T21:21:00Z
MODERATE
0
{'CWE-284'}
{'https://github.com/advisories/GHSA-75p6-52g3-rqc8', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-75p6-52g3-rqc8', 'https://github.com/keycloak/keycloak/commit/76d83f46fad94ebcbedaa49e6daad458e2894e52'}
null
{'https://github.com/keycloak/keycloak/commit/76d83f46fad94ebcbedaa49e6daad458e2894e52'}
{'https://github.com/keycloak/keycloak/commit/76d83f46fad94ebcbedaa49e6daad458e2894e52'}
GHSA
GHSA-378p-hrq3-x4p3
Cross-site scripting in Shopizer
A reflected cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via the ref parameter to a page about an arbitrary product, e.g., a product/insert-product-name-here.html/ref= URL.
{'CVE-2021-33562'}
2021-06-08T23:08:20Z
2021-06-08T23:08:20Z
MODERATE
4.8
{'CWE-79'}
{'https://www.exploit-db.com/exploits/49901', 'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271', 'https://github.com/advisories/GHSA-378p-hrq3-x4p3', 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33562'...
null
{'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}
{'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}
GHSA
GHSA-f248-v4qh-x2r6
Improper Certificate Validation in blackduck
Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 - 0.0.52 does not validate SSL certificates in certain cases.
{'CVE-2020-27589'}
2021-04-20T16:29:41Z
2021-04-20T16:29:41Z
HIGH
7.5
{'CWE-295'}
{'https://github.com/blackducksoftware/hub-rest-api-python/pull/113/commits/273b27d0de1004389dd8cf43c40b1197c787e7cd', 'https://pypi.org/project/blackduck/', 'https://community.synopsys.com/s/question/0D52H00005JCZAXSA5/announcement-black-duck-defect-identified', 'https://github.com/blackducksoftware/hub-rest-api-pytho...
null
{'https://github.com/blackducksoftware/hub-rest-api-python/pull/113/commits/273b27d0de1004389dd8cf43c40b1197c787e7cd'}
{'https://github.com/blackducksoftware/hub-rest-api-python/pull/113/commits/273b27d0de1004389dd8cf43c40b1197c787e7cd'}
GHSA
GHSA-2xvj-j3qh-x8c3
High severity vulnerability that affects private_address_check
private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address.
{'CVE-2018-3759'}
2021-01-08T20:05:48Z
2018-07-31T18:13:05Z
HIGH
0
{'CWE-362'}
{'https://github.com/jtdowney/private_address_check/commit/4068228187db87fea7577f7020099399772bb147', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3759', 'https://github.com/advisories/GHSA-2xvj-j3qh-x8c3'}
null
{'https://github.com/jtdowney/private_address_check/commit/4068228187db87fea7577f7020099399772bb147'}
{'https://github.com/jtdowney/private_address_check/commit/4068228187db87fea7577f7020099399772bb147'}
GHSA
GHSA-gwpx-q2h9-wxgx
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
{'CVE-2021-3964'}
2021-12-03T20:43:25Z
2021-12-03T20:43:25Z
MODERATE
5.9
{'CWE-639'}
{'https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a', 'https://github.com/advisories/GHSA-gwpx-q2h9-wxgx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3964', 'https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744'}
null
{'https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744'}
{'https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744'}
GHSA
GHSA-35fg-hjcr-j65f
Information exposure in xwiki-platform
### Impact It's possible to guess if a user has an account on the wiki by using the "Forgot your password" form, even if the wiki is closed to guest users. ### Patches The problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1. ### Workarounds There's no easy workaround other than applying the upgrade. ### Re...
{'CVE-2022-23619'}
2022-02-16T22:23:42Z
2022-02-09T21:51:19Z
MODERATE
5.3
{'CWE-200', 'CWE-640'}
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-35fg-hjcr-j65f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23619', 'https://jira.xwiki.org/browse/XWIKI-18787', 'https://github.com/advisories/GHSA-35fg-hjcr-j65f', 'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c949...
null
{'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c9494'}
{'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c9494'}
GHSA
GHSA-x2w5-725j-gf2g
Prototype Pollution in convict
An attacker can inject attributes that are used in other components and override existing attributes with ones that have incompatible type, which may lead to a crash. The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely...
{'CVE-2022-22143'}
2022-05-03T02:25:28Z
2022-04-20T16:21:03Z
HIGH
8.4
{'CWE-1321'}
{'https://github.com/mozilla/node-convict/blob/5eb1314f85346760a3c31cb14510f2f0af11d0d3/packages/convict/src/main.js%23L569', 'https://snyk.io/vuln/SNYK-JS-CONVICT-2340604', 'https://www.huntr.dev/bounties/1-npm-convict/', 'https://github.com/mozilla/node-convict/releases/tag/v6.2.2', 'https://github.com/mozilla/node-c...
null
{'https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880'}
{'https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880'}
GHSA
GHSA-673x-f5wx-fxpw
Cross Site Scripting and RCE in baserCMS
baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) and Remote Code Execution (RCE). * Impact: XSS to RCE via Arbitrary file upload. * Attack vector is: Administrator must be logged in. * Components are: ThemeFilesController.php, UploaderFilesController.php. * Tested baserCMS Version : 4.3.6 (Latest) ...
{'CVE-2020-15159'}
2022-04-19T19:02:28Z
2020-08-28T21:45:15Z
LOW
7.6
{'CWE-79'}
{'https://basercms.net/security/20200827', 'https://github.com/baserproject/basercms/security/advisories/GHSA-673x-f5wx-fxpw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15159', 'https://github.com/baserproject/basercms/commit/16a7b3cd09a0ca355474119c76897eac2034a66d', 'https://github.com/advisories/GHSA-673x-f5wx-fxpw...
null
{'https://github.com/baserproject/basercms/commit/16a7b3cd09a0ca355474119c76897eac2034a66d'}
{'https://github.com/baserproject/basercms/commit/16a7b3cd09a0ca355474119c76897eac2034a66d'}
GHSA
GHSA-hf2m-j98r-4fqw
API token verification can be bypassed in NodeBB
### Impact Incorrect logic present in the token verification step unintentionally allowed master token access to the API. ### Patches The vulnerability has been patch as of v1.18.5. ### Workarounds Cherry-pick commit hash 04dab1d550cdebf4c1567bca9a51f8b9ca48a500 to receive this patch in lieu of a full upgrade. ### F...
{'CVE-2021-43786'}
2022-04-19T19:03:13Z
2021-11-30T22:21:05Z
CRITICAL
9.8
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43786', 'https://github.com/advisories/GHSA-hf2m-j98r-4fqw', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-hf2m-j98r-4fqw', 'https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500'...
null
{'https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500'}
{'https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500'}
GHSA
GHSA-v88g-cgmw-v5xw
Prototype Pollution in Ajv
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service...
{'CVE-2020-15366'}
2022-02-10T23:30:59Z
2022-02-10T23:30:59Z
MODERATE
5.6
{'CWE-915'}
{'https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f', 'https://hackerone.com/bugs?subject=user&report_id=894259', 'https://github.com/advisories/GHSA-v88g-cgmw-v5xw', 'https://github.com/ajv-validator/ajv/releases/tag/v6.12.3', 'https://github.com/ajv-validator/ajv/tags', 'https://nvd...
null
{'https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f'}
{'https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f'}
GHSA
GHSA-579h-mv94-g4gp
Privilege Escalation in Kubernetes
In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connec...
{'CVE-2018-1002105'}
2022-04-12T22:34:38Z
2022-02-15T01:57:18Z
CRITICAL
9.8
{'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1002105', 'https://access.redhat.com/errata/RHSA-2018:3624', 'https://www.openwall.com/lists/oss-security/2019/06/28/2', 'https://github.com/kubernetes/kubernetes/commit/2257c1ecbe3c0cf71dd50b82752ae189c94ec905', 'https://access.redhat.com/errata/RHSA-2018:3752', 'https://acc...
null
{'https://github.com/kubernetes/kubernetes/commit/2257c1ecbe3c0cf71dd50b82752ae189c94ec905'}
{'https://github.com/kubernetes/kubernetes/commit/2257c1ecbe3c0cf71dd50b82752ae189c94ec905'}
GHSA
GHSA-xpfv-89vg-r562
Cross Site Request Forgery in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk.
{'CVE-2022-0335'}
2022-02-02T16:06:35Z
2022-01-28T22:07:23Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/moodle/moodle/commit/d40cc61eba229c6d1f47b9a525022fbc9136b9f6', 'https://github.com/advisories/GHSA-xpfv-89vg-r562', 'https://bugzilla.redhat.com/show_bug.cgi?id=2043666', 'https://moodle.org/mod/forum/discuss.php?d=431103', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0335'}
null
{'https://github.com/moodle/moodle/commit/d40cc61eba229c6d1f47b9a525022fbc9136b9f6'}
{'https://github.com/moodle/moodle/commit/d40cc61eba229c6d1f47b9a525022fbc9136b9f6'}
GHSA
GHSA-68wg-qv6r-j4vp
SQL Injection in usmanhalalit/pixie
Pixie versions 1.0.x before 1.0.3, and 2.0.x before 2.0.2 allow SQL Injection in the limit() function due to improper sanitization.
{'CVE-2019-10766'}
2021-08-18T22:44:59Z
2019-11-20T17:44:54Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-68wg-qv6r-j4vp', 'https://snyk.io/vuln/SNYK-PHP-USMANHALALITPIXIE-534879', 'https://github.com/usmanhalalit/pixie/commit/9bd991021abbcbfb19347a07dca8b7e518b8abc9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10766'}
null
{'https://github.com/usmanhalalit/pixie/commit/9bd991021abbcbfb19347a07dca8b7e518b8abc9'}
{'https://github.com/usmanhalalit/pixie/commit/9bd991021abbcbfb19347a07dca8b7e518b8abc9'}
GHSA
GHSA-23f7-99jx-m54r
Remote code execution in dependabot-core branch names when cloning
### Impact Remote code execution vulnerability in `dependabot-common` and `dependabot-go_modules` when a source branch name contains malicious injectable bash code. For example, if Dependabot is configured to use the following source branch name: `"/$({curl,127.0.0.1})"`, Dependabot will make a HTTP request to the fo...
{'CVE-2020-26222'}
2022-04-19T19:02:40Z
2020-11-13T15:47:50Z
LOW
8.7
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26222', 'https://github.com/advisories/GHSA-23f7-99jx-m54r', 'https://rubygems.org/gems/dependabot-common', 'https://github.com/dependabot/dependabot-core/security/advisories/GHSA-23f7-99jx-m54r', 'https://rubygems.org/gems/dependabot-omnibus', 'https://github.com/dependabot/...
null
{'https://github.com/dependabot/dependabot-core/commit/e089116abbe284425b976f7920e502b8e83a61b5'}
{'https://github.com/dependabot/dependabot-core/commit/e089116abbe284425b976f7920e502b8e83a61b5'}
GHSA
GHSA-85rr-4rh9-hhwh
Memory leak in Nanopb
### Impact Decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded contains the submessage multiple times. This is rare in normal messages, but it is a concern when untrusted data i...
{'CVE-2020-26243'}
2021-01-07T22:39:40Z
2020-11-25T16:53:27Z
MODERATE
7.5
{'CWE-119', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26243', 'https://github.com/nanopb/nanopb/commit/4fe23595732b6f1254cfc11a9b8d6da900b55b0c', 'https://github.com/nanopb/nanopb/security/advisories/GHSA-85rr-4rh9-hhwh', 'https://github.com/advisories/GHSA-85rr-4rh9-hhwh', 'https://github.com/nanopb/nanopb/issues/615', 'https:/...
null
{'https://github.com/nanopb/nanopb/commit/4fe23595732b6f1254cfc11a9b8d6da900b55b0c'}
{'https://github.com/nanopb/nanopb/commit/4fe23595732b6f1254cfc11a9b8d6da900b55b0c'}
GHSA
GHSA-384w-5v3f-q499
Base class whitelist configuration ignored in OAuthenticator
### Impact __What goes wrong?__ The deprecated (in jupyterhub 1.2) configuration `Authenticator.whitelist`, which should be transparently mapped to `Authenticator.allowed_users` with a warning, is instead ignored by OAuthenticator classes, resulting in the same behavior as if this configuration has not been set. If t...
{'CVE-2020-26250'}
2021-01-07T22:38:55Z
2020-12-01T20:25:00Z
HIGH
6.3
{'CWE-863'}
{'https://github.com/advisories/GHSA-384w-5v3f-q499', 'https://jupyterhub.readthedocs.io/en/1.2.2/getting-started/authenticators-users-basics.html#add-or-remove-users-from-the-hub', 'https://github.com/jupyterhub/oauthenticator/security/advisories/GHSA-384w-5v3f-q499', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26250',...
null
{'https://github.com/jupyterhub/oauthenticator/commit/a4aac191c16cf6281f3d346615aefa75702b02d7'}
{'https://github.com/jupyterhub/oauthenticator/commit/a4aac191c16cf6281f3d346615aefa75702b02d7'}
GHSA
GHSA-gcvh-66ff-4mwm
`CHECK`-failures in Tensorflow
### Impact The [implementation of `MapStage`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550) is vulnerable a `CHECK`-fail if the key tensor is not a scalar: ```python import tensorflow as tf import numpy as np tf.raw_ops.MapSt...
{'CVE-2022-21734'}
2022-02-11T16:55:37Z
2022-02-10T00:21:12Z
MODERATE
6.5
{'CWE-617', 'CWE-843'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21734', 'https://github.com/advisories/GHSA-gcvh-66ff-4mwm', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66f...
null
{'https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d'}
{'https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d'}
GHSA
GHSA-crf2-xm6x-46p6
Observable Timing Discrepancy in OpenMage LTS
### Impact This vulnerability allows to circumvent the **formkey protection** in the Admin Interface and increases the attack surface for **Cross Site Request Forgery** attacks ### Patches The latest OpenMage Versions up from 19.4.6 and 20.0.2 have this Issue solved ### References Related to Adobes CVE-2020-9690 (...
{'CVE-2020-15151'}
2022-04-19T19:02:33Z
2020-08-19T18:02:36Z
HIGH
8
{'CWE-352', 'CWE-203'}
{'https://helpx.adobe.com/security/products/magento/apsb20-47.html', 'https://github.com/advisories/GHSA-crf2-xm6x-46p6', 'https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a', 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6', 'https://nvd.nist.gov/vu...
null
{'https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a'}
{'https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a'}
GHSA
GHSA-cghx-9gcr-r42x
Path Traversal in the Java Kubernetes Client
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code.
{'CVE-2020-8570'}
2021-04-12T20:53:33Z
2021-01-29T18:12:54Z
MODERATE
7.5
{'CWE-22'}
{'https://groups.google.com/g/kubernetes-security-announce/c/sd5h73sFPrg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8570', 'https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540564711e828fd40@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd...
null
{'https://github.com/kubernetes-client/java/commit/858316ae8bc1145005a0310e1f65f95d2389a589'}
{'https://github.com/kubernetes-client/java/commit/858316ae8bc1145005a0310e1f65f95d2389a589'}
GHSA
GHSA-jxfh-8wgv-vfr2
Prototype pollution in dojo
In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript a...
{'CVE-2020-5258'}
2022-04-01T20:24:08Z
2020-03-10T18:03:14Z
HIGH
7.7
{'CWE-94', 'CWE-74', 'CWE-1321'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-jxfh-8wgv-vfr2', 'https://lists.apache.org/thread.html/r665fcc152bd0fec9f71511a6c2435ff24d3a71386b01b1a6df326fd3@%3Cusers.qpid.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html', 'https://git...
null
{'https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d'}
{'https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d'}
GHSA
GHSA-832h-xg76-4gv6
ReDoS in brace-expansion
Affected versions of `brace-expansion` are vulnerable to a regular expression denial of service condition. ## Proof of Concept ``` var expand = require('brace-expansion'); expand('{,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,\n}'); ``` ## Recommendation Update t...
{'CVE-2017-18077'}
2021-09-03T22:10:25Z
2018-01-29T15:50:46Z
HIGH
7.5
{'CWE-20'}
{'https://www.npmjs.com/advisories/338', 'https://github.com/juliangruber/brace-expansion/issues/33', 'https://bugs.debian.org/862712', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18077', 'https://nodesecurity.io/advisories/338', 'https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69...
null
{'https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69fb097ea5e456c3'}
{'https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69fb097ea5e456c3'}
GHSA
GHSA-8h2j-cgx8-6xv7
Cross-Site Request Forgery (CSRF) in FastAPI
### Impact FastAPI versions lower than `0.65.2` that used cookies for authentication in path operations that received JSON payloads sent by browsers were vulnerable to a Cross-Site Request Forgery (CSRF) attack. In versions lower than `0.65.2`, FastAPI would try to read the request payload as JSON even if the `conten...
{'CVE-2021-32677'}
2022-04-19T19:02:59Z
2021-06-10T15:43:54Z
HIGH
8.2
{'CWE-352'}
{'https://github.com/tiangolo/fastapi/security/advisories/GHSA-8h2j-cgx8-6xv7', 'https://github.com/tiangolo/fastapi/commit/fa7e3c996edf2d5482fff8f9d890ac2390dede4d', 'https://github.com/advisories/GHSA-8h2j-cgx8-6xv7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MATA...
null
{'https://github.com/tiangolo/fastapi/commit/fa7e3c996edf2d5482fff8f9d890ac2390dede4d'}
{'https://github.com/tiangolo/fastapi/commit/fa7e3c996edf2d5482fff8f9d890ac2390dede4d'}
GHSA
GHSA-vr8q-g5c7-m54m
XXE in Nokogiri
### Severity Nokogiri maintainers have evaluated this as [__Low Severity__ (CVSS3 2.6)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N). ### Description In Nokogiri versions <= 1.11.0.rc3, XML Schemas parsed by `Nokogiri::XML::Schema` are **trusted** by default, allowing exte...
{'CVE-2020-26247'}
2022-04-19T19:02:42Z
2020-12-30T18:35:06Z
MODERATE
4.3
{'CWE-611'}
{'https://github.com/advisories/GHSA-vr8q-g5c7-m54m', 'https://rubygems.org/gems/nokogiri', 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26247', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html', 'https://github.com/sparklemotion/nok...
null
{'https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b'}
{'https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b'}
GHSA
GHSA-5jpf-pj32-xx53
Authorization header is not sanitized in an error object in auth0
### Overview Versions before and including `2.27.0` use a block list of specific keys that should be sanitized from the request object contained in the error object. When a request to Auth0 management API fails, the key for `Authorization` header is not sanitized and the `Authorization` header value can be logged expo...
{'CVE-2020-15125'}
2022-04-19T19:02:31Z
2020-07-29T16:26:22Z
HIGH
7.7
{'CWE-209'}
{'https://github.com/auth0/node-auth0/tree/v2.27.1', 'https://github.com/advisories/GHSA-5jpf-pj32-xx53', 'https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c', 'https://github.com/auth0/node-auth0/pull/507', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15125', 'https://github.co...
null
{'https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c'}
{'https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c'}
GHSA
GHSA-7rpj-hg47-cx62
Improper Restriction of XML External Entity Reference in com.h2database:h2.
H2 is an embeddable RDBMS written in Java. The package com.h2database:h2 from 0 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() meth...
{'CVE-2021-23463'}
2022-04-22T15:39:59Z
2021-12-16T14:29:57Z
HIGH
8.1
{'CWE-611'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/h2database/h2database/pull/3199', 'https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23463', 'https://github.com/advisories/GHSA-7rpj-hg47-cx62', 'https://github.com/h2database/h2database/issue...
null
{'https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8#diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3'}
{'https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8#diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3'}
GHSA
GHSA-64fq-9c6w-rq44
Improper Neutralization of Formula Elements in a CSV File in Kimai 2
A CSV Injection vulnerablity exists in Kimai Kimai 2 prior to 1.14.1 via a description in a new timesheet.
{'CVE-2021-43515'}
2022-04-22T20:21:49Z
2022-04-09T00:00:25Z
HIGH
7.8
{'CWE-1236'}
{'https://github.com/advisories/GHSA-64fq-9c6w-rq44', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43515', 'https://github.com/kevinpapst/kimai2/pull/2532', 'https://github.com/kevinpapst/kimai2/commit/dad1b8b772947f1596175add1b4f33b791705507#diff-6774f5865dbaf8bc6c55b75bd92e6f9950ebe7834aa2efd828a19fd637e667cf'}
null
{'https://github.com/kevinpapst/kimai2/commit/dad1b8b772947f1596175add1b4f33b791705507#diff-6774f5865dbaf8bc6c55b75bd92e6f9950ebe7834aa2efd828a19fd637e667cf'}
{'https://github.com/kevinpapst/kimai2/commit/dad1b8b772947f1596175add1b4f33b791705507#diff-6774f5865dbaf8bc6c55b75bd92e6f9950ebe7834aa2efd828a19fd637e667cf'}
GHSA
GHSA-vc3x-gx6c-g99f
Denial of Service in Bytom
In the client in Bytom before 1.0.6, checkTopicRegister in p2p/discover/net.go does not prevent negative idx values, leading to a crash.
{'CVE-2018-18206'}
2022-04-12T22:33:07Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-190'}
{'https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18206', 'https://github.com/Bytom/bytom/pull/1307', 'https://github.com/advisories/GHSA-vc3x-gx6c-g99f'}
null
{'https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42'}
{'https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42'}
GHSA
GHSA-53r4-h27g-rg3x
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-20...
{'CVE-2019-0992'}
2021-03-29T20:59:07Z
2021-03-29T20:59:07Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-53r4-h27g-rg3x', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0992', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0992', 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4', 'https://github.com/chakra-core/ChakraC...
null
{'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4'}
{'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4'}
GHSA
GHSA-43ch-2h55-2vj7
Server-Side Request Forgery in private-ip
Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request se...
{'CVE-2020-28360'}
2021-07-16T14:39:54Z
2021-04-13T15:18:17Z
CRITICAL
9.8
{'CWE-918'}
{'https://github.com/frenchbread/private-ip', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28360', 'https://www.npmjs.com/package/private-ip', 'https://github.com/advisories/GHSA-43ch-2h55-2vj7', 'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9', 'https://johnjhacking.com/blog/cv...
null
{'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9'}
{'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9'}
GHSA
GHSA-57h3-9rgr-c24m
Out of bounds write in Pillow
An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.
{'CVE-2021-25289'}
2021-12-02T17:48:13Z
2021-03-29T16:35:16Z
HIGH
8.8
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25289', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://github.com/advisories/GHSA-57h3-9rgr-c24m', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/python-pillow/Pillow/commit/3fee28eb9479bf7d59e0fa08068f9cc4a6e2f04c'}
null
{'https://github.com/python-pillow/Pillow/commit/3fee28eb9479bf7d59e0fa08068f9cc4a6e2f04c'}
{'https://github.com/python-pillow/Pillow/commit/3fee28eb9479bf7d59e0fa08068f9cc4a6e2f04c'}
GHSA
GHSA-cf3w-g86h-35x4
Code Injection vulnerability in CarrierWave::RMagick
### Impact [CarrierWave::RMagick](https://github.com/carrierwaveuploader/carrierwave/blob/master/lib/carrierwave/processing/rmagick.rb) has a Code Injection vulnerability. Its `#manipulate!` method inappropriately evals the content of mutation option(`:read`/`:write`), allowing attackers to craft a string that can be e...
{'CVE-2021-21305'}
2022-04-27T19:58:19Z
2021-02-08T19:16:39Z
HIGH
7.4
{'CWE-94', 'CWE-74'}
{'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21305', 'https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGE...
null
{'https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7'}
{'https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7'}
GHSA
GHSA-8rf5-92jh-3vc9
Uncaught Exception leading to Denial of Service in json-sanitizer
OWASP json-sanitizer before 1.2.2 can output invalid JSON or throw an undeclared exception for crafted input. This may lead to denial of service if the application is not prepared to handle these situations.
{'CVE-2021-23900'}
2021-05-13T22:31:32Z
2021-05-13T22:31:32Z
HIGH
7.5
{'CWE-248'}
{'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e', 'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2', 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23900', 'https://github.com/advisories/GHSA-8rf5-9...
null
{'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'}
{'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'}
GHSA
GHSA-q348-f93x-9gx4
Lack of Input Validation in zendesk_api_client_php for Zendesk Subdomain
### Impact Lack of input validation of the Zendesk subdomain could expose users of the library to Server Side Request Forgery (SSRF). ### Resolution Validate the provided Zendesk subdomain to be a valid subdomain in: * getAuthUrl * getAccessToken
{'CVE-2021-30492'}
2021-04-29T21:53:06Z
2021-04-29T21:53:06Z
CRITICAL
0
{'CWE-20', 'CWE-918'}
{'https://github.com/zendesk/zendesk_api_client_php/pull/466', 'https://github.com/zendesk/zendesk_api_client_php/commit/b451b743d9d6d81a9abf7cb86e70ec9c5332123e', 'https://github.com/zendesk/zendesk_api_client_php/security/advisories/GHSA-q348-f93x-9gx4', 'https://github.com/advisories/GHSA-q348-f93x-9gx4'}
null
{'https://github.com/zendesk/zendesk_api_client_php/commit/b451b743d9d6d81a9abf7cb86e70ec9c5332123e'}
{'https://github.com/zendesk/zendesk_api_client_php/commit/b451b743d9d6d81a9abf7cb86e70ec9c5332123e'}
GHSA
GHSA-6x3v-rw2q-9gx7
Improper implementation of the session fixation protection in Infinispan
A flaw was found in Infinispan through version 9.4.14.Final. An improper implementation of the session fixation protection in the Spring Session integration can result in incorrect session handling.
{'CVE-2019-10158'}
2021-08-19T16:28:59Z
2020-01-21T21:18:44Z
CRITICAL
9.8
{'CWE-384'}
{'https://github.com/advisories/GHSA-6x3v-rw2q-9gx7', 'https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158', 'https://github.com/infinispan/infinispan/pull/7025', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10158', 'https:...
null
{'https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72'}
{'https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72'}
GHSA
GHSA-cxf7-qrc5-9446
Remote shell execution vulnerability in image_processing
### Impact When using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input, this allows the attacker to execute shell commands: ```rb ImageProcessing::Vips.apply({ system: "echo EXECUTED" }) #>> EXECUTED ``` This method is called internally by Active S...
{'CVE-2022-24720'}
2022-03-10T15:56:29Z
2022-03-01T22:22:26Z
CRITICAL
9.8
{'CWE-20', 'CWE-78'}
{'https://github.com/janko/image_processing/security/advisories/GHSA-cxf7-qrc5-9446', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24720', 'https://github.com/advisories/GHSA-cxf7-qrc5-9446', 'https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada'}
null
{'https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada'}
{'https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada'}
GHSA
GHSA-r3r5-jhw6-4634
Insecure temporary file usage in SWHKD
SWHKD 1.1.5 unsafely uses the /tmp/swhkd.sock pathname. There can be an information leak or denial of service.
{'CVE-2022-27818'}
2022-04-19T18:16:59Z
2022-04-08T00:00:24Z
CRITICAL
9.1
{'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27818', 'https://github.com/waycrate/swhkd/commit/f70b99dd575fab79d8a942111a6980431f006818', 'http://www.openwall.com/lists/oss-security/2022/04/14/1', 'https://github.com/waycrate/swhkd/releases', 'https://github.com/advisories/GHSA-r3r5-jhw6-4634', 'https://github.com/waycr...
null
{'https://github.com/waycrate/swhkd/commit/f70b99dd575fab79d8a942111a6980431f006818'}
{'https://github.com/waycrate/swhkd/commit/f70b99dd575fab79d8a942111a6980431f006818'}
GHSA
GHSA-xf7w-r453-m56c
Arbitrary File Overwrite in fstream
Versions of `fstream` prior to 1.0.12 are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. The `fstream.DirWriter()` function is vul...
{'CVE-2019-13173'}
2021-08-04T20:12:16Z
2019-05-30T17:19:34Z
HIGH
7.5
{'CWE-59'}
{'https://www.npmjs.com/advisories/886', 'https://github.com/advisories/GHSA-xf7w-r453-m56c', 'https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13173', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html', 'https://usn.ub...
null
{'https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22'}
{'https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22'}
GHSA
GHSA-59x4-67mh-px54
Crypt_GPG does not prevent additional options in GPG calls
The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions.
{'CVE-2022-24953'}
2022-03-01T18:36:14Z
2022-02-18T00:00:36Z
MODERATE
5.3
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24953', 'https://github.com/pear/Crypt_GPG/commit/74c8f989cefbe0887274b461dc56197e121bfd04', 'https://github.com/advisories/GHSA-59x4-67mh-px54', 'https://github.com/pear/Crypt_GPG/commit/29c0fbe96d0d4063ecd5c9a4644cb65a7fb7cc4e'}
null
{'https://github.com/pear/Crypt_GPG/commit/29c0fbe96d0d4063ecd5c9a4644cb65a7fb7cc4e', 'https://github.com/pear/Crypt_GPG/commit/74c8f989cefbe0887274b461dc56197e121bfd04'}
{'https://github.com/pear/Crypt_GPG/commit/74c8f989cefbe0887274b461dc56197e121bfd04', 'https://github.com/pear/Crypt_GPG/commit/29c0fbe96d0d4063ecd5c9a4644cb65a7fb7cc4e'}
GHSA
GHSA-5rcc-6cmj-7728
Cross-site Scripting in BookStack
Iframe tags don't have a sandbox attribute, this makes an attacker able to execute malicious javascript via an iframe and perform phishing attacks. The sandbox attribute will block script execution and prevents the content to navigate its top-level browsing context which will stop this type of attack.
{'CVE-2022-0877'}
2022-03-14T21:03:35Z
2022-03-09T00:00:44Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0877', 'https://github.com/advisories/GHSA-5rcc-6cmj-7728', 'https://github.com/bookstackapp/bookstack/commit/856fca8289b7370cafa033ea21c408e7d4303fd6', 'https://huntr.dev/bounties/b04df4e3-ae5a-4dc6-81ec-496248b15f3c'}
null
{'https://github.com/bookstackapp/bookstack/commit/856fca8289b7370cafa033ea21c408e7d4303fd6'}
{'https://github.com/bookstackapp/bookstack/commit/856fca8289b7370cafa033ea21c408e7d4303fd6'}
GHSA
GHSA-qj26-7grj-whg3
Privilege Escalation in fscrypt
The pam_fscrypt module in fscrypt before 0.2.4 may incorrectly restore primary and supplementary group IDs to the values associated with the root user, which allows attackers to gain privileges via a successful login through certain applications that use Linux-PAM (aka pam).
{'CVE-2018-6558'}
2021-06-23T17:18:49Z
2021-06-23T17:18:49Z
MODERATE
6.5
null
{'https://launchpad.net/bugs/1787548', 'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b', 'https://github.com/advisories/GHSA-qj26-7grj-whg3', 'https://github.com/google/fscrypt/issues/77', 'https://github.com/google/fscrypt/commit/315f9b042237200174a1fb99427f74027e191d66', 'https://nv...
null
{'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b', 'https://github.com/google/fscrypt/commit/315f9b042237200174a1fb99427f74027e191d66'}
{'https://github.com/google/fscrypt/commit/315f9b042237200174a1fb99427f74027e191d66', 'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b'}
GHSA
GHSA-vpq7-m4qm-p2gp
Business Logic Errors in microweber
Business Logic Errors in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0596'}
2022-02-24T13:55:55Z
2022-02-16T00:01:45Z
MODERATE
4.3
null
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0596', 'https://github.com/advisories/GHSA-vpq7-m4qm-p2gp', 'https://github.com/microweber/microweber/commit/91a9d899741557c75050614ff7adb8c0e3feb005', 'https://huntr.dev/bounties/f68b994e-2b8b-49f5-af2a-8cd99e8048a5'}
null
{'https://github.com/microweber/microweber/commit/91a9d899741557c75050614ff7adb8c0e3feb005'}
{'https://github.com/microweber/microweber/commit/91a9d899741557c75050614ff7adb8c0e3feb005'}
GHSA
GHSA-fpcp-9h7m-ffpx
Null pointer dereference in TensorFlow
### Impact When [building an XLA compilation cache](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104), if default settings are used, TensorFlow triggers a null pointer dereference: ```cc string allowed_gpus = flr->conf...
{'CVE-2022-23595'}
2022-02-11T19:55:41Z
2022-02-09T23:33:17Z
MODERATE
5.3
{'CWE-476'}
{'https://github.com/advisories/GHSA-fpcp-9h7m-ffpx', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fpcp-9h7m-ffpx', 'https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23595', 'https://github.com/tensorflow/tensorfl...
null
{'https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8'}
{'https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8'}
GHSA
GHSA-599h-8wpj-75xj
Authentication Bypass in tyk-identity-broker
The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-trip (encoding/decoding XML data).
{'CVE-2021-23365'}
2021-06-23T17:23:30Z
2021-06-23T17:23:30Z
CRITICAL
9.1
{'CWE-287'}
{'https://github.com/TykTechnologies/tyk-identity-broker/pull/147', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKIDENTITYBROKER-1089720', 'https://github.com/TykTechnologies/tyk-identity-broker/releases/tag/v1.1.1', 'https://github.com/advisories/GHSA-599h-8wpj-75xj', 'https://nvd.nist.gov/vuln/detail/C...
null
{'https://github.com/TykTechnologies/tyk-identity-broker/commit/46f70420e0911e4e8b638575e29d394c227c75d0', 'https://github.com/TykTechnologies/tyk-identity-broker/commit/243092965b0f93a95a14cb882b5b9a3df61dd5c0'}
{'https://github.com/TykTechnologies/tyk-identity-broker/commit/243092965b0f93a95a14cb882b5b9a3df61dd5c0', 'https://github.com/TykTechnologies/tyk-identity-broker/commit/46f70420e0911e4e8b638575e29d394c227c75d0'}
GHSA
GHSA-xqp8-w826-hh6x
Crash server with query parameter
### Impact Parse Server crashes when if a query request contains an invalid value for the `explain` option. This is due to a bug in the MongoDB Node.js driver which throws an exception that Parse Server cannot catch. ### Patches Upgrade to Parse Server 4.10.3
{'CVE-2021-39187'}
2022-04-19T19:03:07Z
2021-09-02T16:51:14Z
HIGH
7.5
{'CWE-74', 'CWE-20', 'CWE-755'}
{'https://github.com/advisories/GHSA-xqp8-w826-hh6x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39187', 'https://jira.mongodb.org/browse/NODE-3463', 'https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec', 'https://github.com/parse-community/parse-server/security/advisories/GH...
null
{'https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec'}
{'https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec'}
GHSA
GHSA-6qgm-fv6v-rfpv
Overflow/denial of service in `tf.raw_ops.ReverseSequence`
### Impact The implementation of `tf.raw_ops.ReverseSequence` allows for stack overflow and/or `CHECK`-fail based denial of service. ```python import tensorflow as tf input = tf.zeros([1, 1, 1], dtype=tf.int32) seq_lengths = tf.constant([0], shape=[1], dtype=tf.int32) tf.raw_ops.ReverseSequence( input=input, seq...
{'CVE-2021-29575'}
2021-05-21T14:26:13Z
2021-05-21T14:26:13Z
LOW
2.5
{'CWE-119', 'CWE-120'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6qgm-fv6v-rfpv', 'https://github.com/tensorflow/tensorflow/commit/ecf768cbe50cedc0a45ce1ee223146a3d3d26d23', 'https://github.com/advisories/GHSA-6qgm-fv6v-rfpv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29575'}
null
{'https://github.com/tensorflow/tensorflow/commit/ecf768cbe50cedc0a45ce1ee223146a3d3d26d23'}
{'https://github.com/tensorflow/tensorflow/commit/ecf768cbe50cedc0a45ce1ee223146a3d3d26d23'}
GHSA
GHSA-vqj2-4v8m-8vrq
Insecure Temporary File in mlflow
mlflow prior to 1.23.1 contains an insecure temporary file. The insecure function `tempfile.mktemp()` is deprecated and `mkstemp()` should be used instead.
{'CVE-2022-0736'}
2022-03-03T19:18:19Z
2022-02-24T00:00:54Z
HIGH
8.2
{'CWE-668', 'CWE-377'}
{'https://github.com/mlflow/mlflow/commit/61984e6843d2e59235d82a580c529920cd8f3711', 'https://github.com/advisories/GHSA-vqj2-4v8m-8vrq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0736', 'https://huntr.dev/bounties/e5384764-c583-4dec-a1d8-4697f4e12f75'}
null
{'https://github.com/mlflow/mlflow/commit/61984e6843d2e59235d82a580c529920cd8f3711'}
{'https://github.com/mlflow/mlflow/commit/61984e6843d2e59235d82a580c529920cd8f3711'}
GHSA
GHSA-gmjw-49p4-pcfm
Prototype poisoning
### Impact The issue is as follows: when `msgpack5` decodes a map containing a key `"__proto__"`, it assigns the decoded value to `__proto__`. As you are no doubt aware, `Object.prototype.__proto__` is an accessor property for the receiver's prototype. If the value corresponding to the key `__proto__` decodes to a...
{'CVE-2021-21368'}
2022-04-19T19:02:49Z
2021-03-12T22:44:17Z
MODERATE
6.7
{'CWE-915'}
{'https://www.npmjs.com/package/msgpack5', 'https://github.com/mcollina/msgpack5/security/advisories/GHSA-gmjw-49p4-pcfm', 'https://github.com/mcollina/msgpack5/releases/tag/v5.2.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21368', 'https://github.com/mcollina/msgpack5/releases/tag/v4.5.1', 'https://github.com/mcolli...
null
{'https://github.com/mcollina/msgpack5/commit/d4e6cb956ae51c8bb2828e71c7c1107c340cf1e8'}
{'https://github.com/mcollina/msgpack5/commit/d4e6cb956ae51c8bb2828e71c7c1107c340cf1e8'}
GHSA
GHSA-cqxw-3p7v-p9gr
Phusion Passenger uses a known /tmp filename
In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user
{'CVE-2016-10345'}
2022-04-26T20:43:37Z
2018-08-21T17:08:03Z
HIGH
7.8
null
{'https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10345', 'https://github.com/phusion/passenger/blob/stable-5.1/CHANGELOG', 'https://github.com/advisories/GHSA-cqxw-3p7v-p9gr'}
null
{'https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441'}
{'https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441'}
GHSA
GHSA-236h-rqv8-8q73
GraphQL: Security breach on Viewer query
### Impact An authenticated user using the viewer GraphQL query can bypass all read security on his User object and can also bypass all objects linked via relation or Pointer on his User object. ### Patches This vulnerability has been patched in Parse Server 4.3.0. ### Workarounds No ### References See [commit 78239...
{'CVE-2020-15126'}
2022-04-19T19:02:30Z
2020-07-22T23:06:47Z
HIGH
6.5
{'CWE-863'}
{'https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-236h-rqv8-8q73', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15126', 'https://github.com/advisories/GHSA-236h-rqv8-8q73', 'https://github.com/parse...
null
{'https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa'}
{'https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa'}
GHSA
GHSA-232r-66cg-79px
Paramiko not properly checking authention before processing other requests
transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-o...
{'CVE-2018-7750'}
2022-04-26T20:43:25Z
2018-07-12T20:29:30Z
CRITICAL
9.8
{'CWE-287'}
{'https://access.redhat.com/errata/RHSA-2018:1274', 'http://www.securityfocus.com/bid/103713', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html', 'https://usn.ubuntu.com/3603-2/', 'https://github.com/advisories/GHSA-232r-66cg-79px', 'https://access.redhat.com/errata/RHSA-2018:1972', 'https://lists.de...
null
{'https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516'}
{'https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516'}
GHSA
GHSA-7wwv-vh3v-89cq
ReDOS vulnerabities: multiple grammars
### Impact: Potential ReDOS vulnerabilities (exponential and polynomial RegEx backtracking) [oswasp](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS): > The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expres...
null
2022-05-03T08:27:46Z
2020-12-04T16:47:20Z
MODERATE
0
{'CWE-20', 'CWE-400'}
{'https://www.npmjs.com/package/@highlightjs/cdn-assets', 'https://www.npmjs.com/package/highlight.js', 'https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c', 'https://github.com/advisories/GHSA-7wwv-vh3v-89cq', 'https://github.com/highlightjs/highlight.js/security/advisories/GHS...
null
{'https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c'}
{'https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c'}
GHSA
GHSA-h7f9-cvh5-qw7f
Path traversal in pimcore/pimcore
This affects the package pimcore/pimcore before 6.8.8. A Local FIle Inclusion vulnerability exists in the downloadCsvAction function of the CustomReportController class (bundles/AdminBundle/Controller/Reports/CustomReportController.php). An authenticated user can reach this function with a GET request at the following ...
{'CVE-2021-23340'}
2021-02-25T16:32:46Z
2021-02-25T16:32:46Z
HIGH
0
{'CWE-22'}
{'https://github.com/pimcore/pimcore/commit/1786bdd4962ee51544fad537352c2b4223309442', 'https://github.com/advisories/GHSA-h7f9-cvh5-qw7f', 'https://github.com/pimcore/pimcore/blob/v6.7.2/bundles/AdminBundle/Controller/Reports/CustomReportController.php%23L454', 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1070132', '...
null
{'https://github.com/pimcore/pimcore/commit/1786bdd4962ee51544fad537352c2b4223309442'}
{'https://github.com/pimcore/pimcore/commit/1786bdd4962ee51544fad537352c2b4223309442'}
GHSA
GHSA-8462-q7x7-g2x4
High severity vulnerability that affects bson
The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string.
{'CVE-2018-13863'}
2021-09-03T22:29:40Z
2018-09-17T20:44:58Z
HIGH
7.5
{'CWE-400', 'CWE-185'}
{'https://github.com/advisories/GHSA-8462-q7x7-g2x4', 'https://snyk.io/vuln/npm:bson:20180225', 'https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a', 'https://nvd.nist.gov/vuln/detail/CVE-2018-13863'}
null
{'https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a'}
{'https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a'}
GHSA
GHSA-xcwj-wfcm-m23c
Invalid validation in `SparseMatrixSparseCholesky`
### Impact An attacker can trigger a null pointer dereference by providing an invalid `permutation` to `tf.raw_ops.SparseMatrixSparseCholesky`: ```python import tensorflow as tf import numpy as np from tensorflow.python.ops.linalg.sparse import sparse_csr_matrix_ops indices_array = np.array([[0, 0]]) value_array = np...
{'CVE-2021-29530'}
2021-05-21T14:22:09Z
2021-05-21T14:22:09Z
LOW
2.5
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29530', 'https://github.com/advisories/GHSA-xcwj-wfcm-m23c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xcwj-wfcm-m23c', 'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'}
null
{'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'}
{'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'}
GHSA
GHSA-24x6-8c7m-hv3f
Heap OOB read in TFLite's implementation of `Minimum` or `Maximum`
### Impact The implementations of the `Minimum` and `Maximum` TFLite operators can be used to read data outside of bounds of heap allocated objects, if any of the two input tensor arguments are empty. This is because [the broadcasting implementation](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9...
{'CVE-2021-29590'}
2021-05-21T14:26:53Z
2021-05-21T14:26:53Z
LOW
2.5
{'CWE-125'}
{'https://github.com/advisories/GHSA-24x6-8c7m-hv3f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29590', 'https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x6-8c7m-hv3f'}
null
{'https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578'}
{'https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578'}
GHSA
GHSA-xmh9-rg6f-j3mr
Verification flaw in Solid identity-token-verifier
### Impact #### Severity Any Pod on a Solid server using a vulnerable version of the identity-token-verifier library is at risk of a spoofed Demonstration of Proof-of-Possession (DPoP) token binding. This vulnerability could give total and complete access to a targeted Pod. #### Summary A verification flaw in the impl...
null
2021-03-12T22:39:01Z
2021-03-12T22:39:01Z
MODERATE
0
{'CWE-290'}
{'https://github.com/solid/identity-token-verifier/security/advisories/GHSA-xmh9-rg6f-j3mr', 'https://github.com/solid/identity-token-verifier/commit/fbdeb4aa8c12694b3744cd0454acb826817d9e6c', 'https://github.com/advisories/GHSA-xmh9-rg6f-j3mr', 'https://www.npmjs.com/package/@solid/identity-token-verifier', 'https://g...
null
{'https://github.com/solid/identity-token-verifier/commit/fbdeb4aa8c12694b3744cd0454acb826817d9e6c'}
{'https://github.com/solid/identity-token-verifier/commit/fbdeb4aa8c12694b3744cd0454acb826817d9e6c'}
GHSA
GHSA-ph87-fvjr-v33w
CHECK-fail in `tf.raw_ops.RFFT`
### Impact An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.RFFT`: ```python import tensorflow as tf inputs = tf.constant([1], shape=[1], dtype=tf.float32) fft_length = tf.constant([0], shape=[1], dtype=tf.int32) tf.raw_ops.RFFT(input=inputs,...
{'CVE-2021-29563'}
2021-05-21T14:25:05Z
2021-05-21T14:25:05Z
LOW
2.5
{'CWE-617'}
{'https://github.com/advisories/GHSA-ph87-fvjr-v33w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29563', 'https://github.com/tensorflow/tensorflow/commit/31bd5026304677faa8a0b77602c6154171b9aec1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ph87-fvjr-v33w'}
null
{'https://github.com/tensorflow/tensorflow/commit/31bd5026304677faa8a0b77602c6154171b9aec1'}
{'https://github.com/tensorflow/tensorflow/commit/31bd5026304677faa8a0b77602c6154171b9aec1'}
GHSA
GHSA-h67m-xg8f-fxcf
Deadlock in mutually recursive `tf.function` objects
### Impact The [code behind `tf.function` API](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/python/eager/def_function.py#L542) can be made to deadlock when two `tf.function` decorated Python functions are mutually recursive: ```python import tensorflow as tf @tf.f...
{'CVE-2021-41213'}
2021-11-10T18:59:32Z
2021-11-10T18:59:32Z
MODERATE
5.5
{'CWE-667'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h67m-xg8f-fxcf', 'https://github.com/advisories/GHSA-h67m-xg8f-fxcf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41213', 'https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7'}
null
{'https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7'}
{'https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7'}
GHSA
GHSA-p4v2-r99v-wjc2
Improper Encoding or Escaping of Output in Nicotine+
Denial of service (DoS) vulnerability in Nicotine+ starting with version 3.0.3 and prior to version 3.2.1 allows a user with a modified Soulseek client to crash Nicotine+ by sending a file download request with a file path containing a null character.
{'CVE-2021-45848'}
2022-03-29T21:18:19Z
2022-03-16T00:00:38Z
HIGH
7.5
{'CWE-116'}
{'https://github.com/nicotine-plus/nicotine-plus/issues/1777', 'https://github.com/nicotine-plus/nicotine-plus/commit/0e3e2fac27a518f0a84330f1ddf1193424522045', 'https://github.com/advisories/GHSA-p4v2-r99v-wjc2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWYV53KERF...
null
{'https://github.com/nicotine-plus/nicotine-plus/commit/0e3e2fac27a518f0a84330f1ddf1193424522045'}
{'https://github.com/nicotine-plus/nicotine-plus/commit/0e3e2fac27a518f0a84330f1ddf1193424522045'}
GHSA
GHSA-vj54-cjrx-x696
Observable Discrepancy in Argo
Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts within Argo.
{'CVE-2020-11576'}
2021-12-09T19:59:24Z
2021-12-09T19:59:24Z
MODERATE
5.3
{'CWE-203'}
{'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1', 'https://www.soluble.ai/blog/argo-cves-2020', 'https://github.com/advisories/GHSA-vj54-cjrx-x696', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11576', 'https://github.com/argoproj/argo-cd/pull/3215'}
null
{'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1'}
{'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1'}
GHSA
GHSA-6gg3-pmm7-97xc
DOM-based XSS in auth0-lock
### Overview Versions before and including `11.25.1` are using `dangerouslySetInnerHTML` to display an informational message when used with a Passwordless or Enterprise connection. - For Passwordless connection, the value of the input (email or phone number) is displayed back to the user while waiting for verification...
{'CVE-2020-15119'}
2022-04-19T19:02:31Z
2020-08-19T21:05:03Z
LOW
6.4
{'CWE-79'}
{'https://github.com/auth0/lock/commit/3711fb5b42afd40073a61a58759251f51e768b1b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15119', 'https://github.com/auth0/lock/security/advisories/GHSA-6gg3-pmm7-97xc', 'https://github.com/advisories/GHSA-6gg3-pmm7-97xc'}
null
{'https://github.com/auth0/lock/commit/3711fb5b42afd40073a61a58759251f51e768b1b'}
{'https://github.com/auth0/lock/commit/3711fb5b42afd40073a61a58759251f51e768b1b'}
GHSA
GHSA-vwhq-49r4-gj9v
Reference binding to `nullptr` in `tf.ragged.cross`
### Impact The [shape inference code for `tf.ragged.cross`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/ragged_array_ops.cc#L64) has an undefined behavior due to binding a reference to `nullptr`. In the following scenario, this results in a crash: ```pytho...
{'CVE-2021-41214'}
2021-11-10T18:58:16Z
2021-11-10T18:58:16Z
HIGH
7.8
{'CWE-824'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41214', 'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8', 'https://github.com/advisories/GHSA-vwhq-49r4-gj9v', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vwhq-49r4-gj9v'}
null
{'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'}
{'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'}
GHSA
GHSA-vh5c-jqfg-mhrh
Cross-Site Request Forgery in xwiki-platform
### Impact It's possible to know if a user has or not an account in a wiki related to an email address, and which username(s) is actually tight to that email by forging a request to the Forgot username page. Note that since this page does not have a CSRF check it's quite easy to perform a lot of those requests. ### Pa...
{'CVE-2021-32732'}
2022-02-11T21:08:09Z
2022-02-10T22:42:46Z
HIGH
7.5
{'CWE-352'}
{'https://jira.xwiki.org/browse/XWIKI-18408', 'https://github.com/advisories/GHSA-vh5c-jqfg-mhrh', 'https://github.com/xwiki/xwiki-platform/commit/f0440dfcbba705e03f7565cd88893dde57ca3fa8', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vh5c-jqfg-mhrh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3273...
null
{'https://github.com/xwiki/xwiki-platform/commit/69548c0320cbd772540cf4668743e69f879812cf', 'https://github.com/xwiki/xwiki-platform/commit/f0440dfcbba705e03f7565cd88893dde57ca3fa8'}
{'https://github.com/xwiki/xwiki-platform/commit/69548c0320cbd772540cf4668743e69f879812cf', 'https://github.com/xwiki/xwiki-platform/commit/f0440dfcbba705e03f7565cd88893dde57ca3fa8'}
GHSA
GHSA-grmf-4fq6-2r79
Improper Restriction of Operations within the Bounds of a Memory Buffer in aubio
aubio v0.4.0 to v0.4.8 has a Buffer Overflow in new_aubio_tempo.
{'CVE-2018-19800'}
2022-03-21T19:05:04Z
2019-07-26T16:10:28Z
CRITICAL
9.8
{'CWE-119'}
{'https://github.com/aubio/aubio/commit/b1559f4c9ce2b304d8d27ffdc7128b6795ca82e5', 'https://github.com/advisories/GHSA-grmf-4fq6-2r79', 'https://github.com/aubio/aubio/blob/0.4.9/ChangeLog', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19800'}
null
{'https://github.com/aubio/aubio/commit/b1559f4c9ce2b304d8d27ffdc7128b6795ca82e5'}
{'https://github.com/aubio/aubio/commit/b1559f4c9ce2b304d8d27ffdc7128b6795ca82e5'}
GHSA
GHSA-fxh6-w476-hgr4
Directory Traversal in SharpCompress
SharpCompress prior to version 0.21 is vulnerable to path traversal issue in archive extraction.
{'CVE-2018-1002206'}
2021-08-17T22:21:47Z
2019-09-11T22:59:57Z
MODERATE
5.5
{'CWE-22'}
{'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f', 'https://github.com/advisories/GHSA-fxh6-w476-hgr4'}
null
{'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'}
{'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'}
GHSA
GHSA-mvvp-gwgc-5hrp
Path Traversal in elFinder.Net.Core
This affects the package elFinder.Net.Core from 0 and before 1.2.4. The user-controlled file name is not properly sanitized before it is used to create a file system path.
{'CVE-2021-23407'}
2021-08-31T21:21:26Z
2021-08-02T17:30:27Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-mvvp-gwgc-5hrp', 'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23407', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1315152', 'https://github.com/trannamtrung1st/elFinder.Net.Co...
null
{'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73'}
{'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73'}
GHSA
GHSA-q3j5-32m5-58c2
Privilege Elevation in runc
libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.
{'CVE-2016-3697'}
2021-12-20T18:21:34Z
2021-12-20T18:21:34Z
HIGH
7.8
null
{'https://github.com/opencontainers/runc/releases/tag/v0.1.0', 'https://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html', 'https://rhn.redhat.com/errata/RHSA-2016-2634.html', 'https://github.com/advisories/GHSA-q3j5-32m5-58c2', 'https://security.gentoo.org/glsa/201612-28', 'https://nvd.nist.gov/vuln/detail/CV...
null
{'https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091'}
{'https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091'}