ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-fg5w-w99f-rj6w | Command Injection in @ronomon/opened | The @ronomon/opened library before 1.5.2 is vulnerable to a command injection vulnerability which would allow a remote attacker to execute commands on the system if the library was used with untrusted input. | {'CVE-2021-29300'} | 2021-06-08T23:15:35Z | 2021-06-08T23:15:35Z | CRITICAL | 9.8 | {'CWE-77'} | {'https://advisory.checkmarx.net/advisory/CX-2021-4775', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29300', 'https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec', 'https://github.com/advisories/GHSA-fg5w-w99f-rj6w'} | null | {'https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec'} | {'https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec'} |
GHSA | GHSA-ghq2-m3pq-qf3p | Stored XSS in Jenkins CVS Plugin | Jenkins CVS Plugin 2.19 and earlier does not escape the name and description of CVS Symbolic Name parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | {'CVE-2022-29037'} | 2022-05-03T20:52:55Z | 2022-04-13T00:00:18Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-ghq2-m3pq-qf3p', 'https://github.com/jenkinsci/cvs-plugin/commit/043ef8801a7b3fbbf778245c3c7174d21e42efe2', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29037'} | null | {'https://github.com/jenkinsci/cvs-plugin/commit/043ef8801a7b3fbbf778245c3c7174d21e42efe2'} | {'https://github.com/jenkinsci/cvs-plugin/commit/043ef8801a7b3fbbf778245c3c7174d21e42efe2'} |
GHSA | GHSA-x2j7-6hxm-87p3 | Remote code injection | An issue was discovered in Craft CMS before 3.6.7. In some circumstances, a potential Remote Code Execution vulnerability existed on sites that did not restrict administrative changes (if an attacker were somehow able to hijack an administrator's session). | {'CVE-2021-27903'} | 2021-07-07T17:13:31Z | 2021-07-02T18:36:41Z | CRITICAL | 9.8 | {'CWE-94', 'CWE-74'} | {'https://github.com/advisories/GHSA-x2j7-6hxm-87p3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27903', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#367---2021-02-23', 'https://github.com/craftcms/cms/commit/c17728fa0bec11d3b82c34defe0... | null | {'https://github.com/craftcms/cms/commit/c17728fa0bec11d3b82c34defe0930ed409aec38'} | {'https://github.com/craftcms/cms/commit/c17728fa0bec11d3b82c34defe0930ed409aec38'} |
GHSA | GHSA-6fc8-4gx4-v693 | ReDoS in Sec-Websocket-Protocol header | ### Impact
A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server.
### Proof of concept
```js
for (const length of [1000, 2000, 4000, 8000, 16000, 32000]) {
const value = 'b' + ' '.repeat(length) + 'x';
const start = process.hrtime.bigint();
value.t... | {'CVE-2021-32640'} | 2022-04-19T19:02:58Z | 2021-05-28T19:19:03Z | MODERATE | 5.3 | {'CWE-400', 'CWE-345'} | {'https://github.com/advisories/GHSA-6fc8-4gx4-v693', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32640', 'https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E', 'https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693', 'https... | null | {'https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff'} | {'https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff'} |
GHSA | GHSA-h3p9-wrgx-82cm | Use of a Broken or Risky Cryptographic Algorithm in Terraform | When using the Azure backend with a shared access signature (SAS), Terraform versions prior to 0.12.17 may transmit the token and state snapshot using cleartext HTTP. | {'CVE-2019-19316'} | 2021-07-28T16:28:51Z | 2021-05-18T18:18:50Z | HIGH | 3.7 | {'CWE-327', 'CWE-20'} | {'https://github.com/hashicorp/terraform/commit/6db3cf8e5b4cfb2a3cd1d99a813b50b2d5d363bb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19316', 'https://github.com/advisories/GHSA-h3p9-wrgx-82cm', 'https://github.com/hashicorp/terraform/issues/23493', 'https://github.com/hashicorp/terraform/security/advisories/GHSA-4rvg-... | null | {'https://github.com/hashicorp/terraform/commit/6db3cf8e5b4cfb2a3cd1d99a813b50b2d5d363bb'} | {'https://github.com/hashicorp/terraform/commit/6db3cf8e5b4cfb2a3cd1d99a813b50b2d5d363bb'} |
GHSA | GHSA-w2fr-65vp-mxw3 | Deserialization of untrusted data in Symfony | In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpun... | {'CVE-2019-10912'} | 2021-08-19T17:12:23Z | 2020-02-12T18:44:50Z | HIGH | 7.1 | {'CWE-502'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/', 'https://symfony.com/blog/cve-2019-10912-prevent-destru... | null | {'https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b'} | {'https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b'} |
GHSA | GHSA-j85q-whc9-g4p9 | Use of Cryptographically Weak Pseudo-Random Number Generator in showdoc | showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | {'CVE-2021-3678'} | 2021-09-02T17:07:48Z | 2021-09-02T17:07:48Z | MODERATE | 5.9 | {'CWE-338'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3678', 'https://github.com/advisories/GHSA-j85q-whc9-g4p9', 'https://github.com/star7th/showdoc/commit/4b962c1740311e0d46775023b6acba39ad60e370', 'https://huntr.dev/bounties/f9a9defd-29ea-4442-b692-ff1512813de4'} | null | {'https://github.com/star7th/showdoc/commit/4b962c1740311e0d46775023b6acba39ad60e370'} | {'https://github.com/star7th/showdoc/commit/4b962c1740311e0d46775023b6acba39ad60e370'} |
GHSA | GHSA-5jgq-x857-p8xw | Account compromise in Evmos | ## Impact
_What kind of vulnerability is it? Who is impacted?_
### Classification
The vulnerability has been classified as `critical` with a score of `9.0` (highest). It has the potential to affect and drain unclaimed airdrop funds from Cosmos and Osmosis eligible user addresses.
### Disclosure
The attack requires ... | {'CVE-2022-24738'} | 2022-03-18T20:07:35Z | 2022-03-07T21:45:59Z | HIGH | 7.4 | {'CWE-287'} | {'https://github.com/advisories/GHSA-5jgq-x857-p8xw', 'https://github.com/tharsis/evmos/security/advisories/GHSA-5jgq-x857-p8xw', 'https://github.com/tharsis/evmos/commit/28870258d4ee9f1b8aeef5eba891681f89348f71', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24738', 'https://github.com/tharsis/evmos/releases/tag/v2.0.1'} | null | {'https://github.com/tharsis/evmos/commit/28870258d4ee9f1b8aeef5eba891681f89348f71'} | {'https://github.com/tharsis/evmos/commit/28870258d4ee9f1b8aeef5eba891681f89348f71'} |
GHSA | GHSA-rgcm-rpq9-9cgr | Missing Authentication for Critical Function in Saleor | An issue was discovered in Mirumee Saleor 2.x before 2.9.1. Incorrect access control in the checkoutCustomerAttach mutations allows attackers to attach their checkouts to any user ID and consequently leak user data (e.g., name, address, and previous orders of any other customer). | {'CVE-2020-7964'} | 2021-07-28T17:57:09Z | 2021-07-28T17:57:09Z | MODERATE | 5.3 | {'CWE-306'} | {'https://github.com/advisories/GHSA-rgcm-rpq9-9cgr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7964', 'https://github.com/mirumee/saleor/releases/tag/2.9.1', 'https://github.com/mirumee/saleor/commit/233b8890c60fa6d90daf99e4d90fea85867732c3'} | null | {'https://github.com/mirumee/saleor/commit/233b8890c60fa6d90daf99e4d90fea85867732c3'} | {'https://github.com/mirumee/saleor/commit/233b8890c60fa6d90daf99e4d90fea85867732c3'} |
GHSA | GHSA-r74q-gxcg-73hx | High severity vulnerability that affects simple_form | ## Incorrect Access Control in `file_method?` in `lib/simple_form/form_builder.rb`; a user-supplied string is invoked as a method call
### Impact
For pages that build a form using user input, it is possible for an attacker to manipulate the input and send any method present in the form object. For example:
```erb
<%=... | {'CVE-2019-16676'} | 2021-09-17T14:36:30Z | 2019-09-30T19:41:15Z | CRITICAL | 9.8 | {'CWE-20'} | {'https://github.com/plataformatec/simple_form/security/advisories/GHSA-r74q-gxcg-73hx', 'https://github.com/advisories/GHSA-r74q-gxcg-73hx', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16676', 'https://github.com/plataformatec/simple_form/commits/master', 'http://blog.plataformatec.com.br/2019/09/incorrect-access-contr... | null | {'https://github.com/plataformatec/simple_form/commits/master'} | {'https://github.com/plataformatec/simple_form/commits/master'} |
GHSA | GHSA-9r27-994c-4xch | discord-html not escaping HTML code blocks when lacking a language identifier | ### Impact
Any website using discord-markdown with user-generated markdown is vulnerable to having code injected into the page where the markdown is displayed.
### Patches
This has been patched in version 2.3.1
### Workarounds
Escape the characters `<>&` before sending plain code blocks to discord-markdown.... | null | 2020-02-24T17:34:02Z | 2020-02-24T17:34:02Z | HIGH | 0 | null | {'https://github.com/brussell98/discord-markdown/security/advisories/GHSA-9r27-994c-4xch', 'https://github.com/advisories/GHSA-9r27-994c-4xch', 'https://github.com/brussell98/discord-markdown/commit/7ce2eb66520815dcf5e97ef2bc8a2d5979da66e7', 'https://github.com/brussell98/discord-markdown/issues/13'} | null | {'https://github.com/brussell98/discord-markdown/commit/7ce2eb66520815dcf5e97ef2bc8a2d5979da66e7'} | {'https://github.com/brussell98/discord-markdown/commit/7ce2eb66520815dcf5e97ef2bc8a2d5979da66e7'} |
GHSA | GHSA-2cpx-427x-q2c6 | CHECK-fail in AddManySparseToTensorsMap | ### Impact
An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.AddManySparseToTensorsMap`:
```python
import tensorflow as tf
import numpy as np
sparse_indices = tf.constant(530, shape=[1, 1], dtype=tf.int64)
sparse_values = tf.ones([1], dtype=tf.int64)
shape = tf.Variable(tf.ones([55], dty... | {'CVE-2021-29523'} | 2021-05-21T14:21:43Z | 2021-05-21T14:21:43Z | LOW | 2.5 | {'CWE-190'} | {'https://github.com/advisories/GHSA-2cpx-427x-q2c6', 'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29523', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2cpx-427x-q2c6'} | null | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'} | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'} |
GHSA | GHSA-582f-p4pg-xc74 | Regular Expression Denial of Service in csv-parse | Versions of `csv-parse` prior to 4.4.6 are vulnerable to Regular Expression Denial of Service. The `__isInt()` function contains a malformed regular expression that processes large specially-crafted input very slowly, leading to a Denial of Service. This is triggered when using the `cast` option.
## Recommendation
U... | {'CVE-2019-17592'} | 2022-01-04T19:51:33Z | 2019-10-15T20:06:16Z | HIGH | 7.5 | {'CWE-20', 'CWE-400'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://github.com/advisories/GHSA-582f-p4pg-xc74', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17592', 'https://www.npmjs.com/advisories/1171', 'https://github.com/adaltas/node-csv-parse... | null | {'https://github.com/adaltas/node-csv-parse/commit/b9d35940c6815cdf1dfd6b21857a1f6d0fd51e4a'} | {'https://github.com/adaltas/node-csv-parse/commit/b9d35940c6815cdf1dfd6b21857a1f6d0fd51e4a'} |
GHSA | GHSA-x24j-87x9-jvv5 | Improper Authorization in Publify | In Publify, 9.0.0.pre1 to 9.2.4 are vulnerable to Improper Access Control. “guest” role users can self-register even when the admin does not allow. This happens due to front-end restriction only. | {'CVE-2021-25973'} | 2022-04-19T19:03:25Z | 2021-11-03T17:34:22Z | MODERATE | 6.5 | {'CWE-863', 'CWE-285'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25973', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25973', 'https://github.com/advisories/GHSA-x24j-87x9-jvv5', 'https://github.com/publify/publify/commit/3447e0241e921b65f6eb1090453d8ea73e98387e'} | null | {'https://github.com/publify/publify/commit/3447e0241e921b65f6eb1090453d8ea73e98387e'} | {'https://github.com/publify/publify/commit/3447e0241e921b65f6eb1090453d8ea73e98387e'} |
GHSA | GHSA-xmw9-q7x9-j5qc | Unbounded connection acceptance leads to file handle exhaustion | ### Impact
All servers running blaze-core <= 0.14.14, including blaze-http and http4s-blaze-server users, are affected.
Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incom... | {'CVE-2021-21293'} | 2021-02-09T18:51:29Z | 2021-02-02T21:42:49Z | HIGH | 0 | {'CWE-400'} | {'https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1', 'https://github.com/advisories/GHSA-xmw9-q7x9-j5qc', 'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc', 'https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w', 'https://nvd.nist.gov/vuln/detai... | null | {'https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1'} | {'https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1'} |
GHSA | GHSA-vwpg-f6gw-rjvf | Incorrect Authorization in Spring Cloud Netflix Zuul | Applications using the “Sensitive Headers” functionality in Spring Cloud Netflix Zuul 2.2.6.RELEASE and below may be vulnerable to bypassing the “Sensitive Headers” restriction when executing requests with specially constructed URLs. Applications that use Spring Security's StrictHttpFirewall (enabled by default for all... | {'CVE-2021-22113'} | 2021-05-10T15:18:50Z | 2021-05-10T15:18:50Z | MODERATE | 0 | {'CWE-863'} | {'https://tanzu.vmware.com/security/cve-2021-22113', 'https://github.com/spring-cloud/spring-cloud-netflix/commit/8ecb3dca511c3ce0454e42ac31ee2331d7318c07', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22113', 'https://github.com/advisories/GHSA-vwpg-f6gw-rjvf'} | null | {'https://github.com/spring-cloud/spring-cloud-netflix/commit/8ecb3dca511c3ce0454e42ac31ee2331d7318c07'} | {'https://github.com/spring-cloud/spring-cloud-netflix/commit/8ecb3dca511c3ce0454e42ac31ee2331d7318c07'} |
GHSA | GHSA-69j6-29vr-p3j9 | Authentication bypass for viewing and deletions of snapshots | Today we are releasing Grafana 7.5.11, and 8.1.6. These patch releases include an important security fix for an issue that affects all Grafana versions from 2.0.1.
[Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterpri... | {'CVE-2021-39226'} | 2022-04-19T19:03:09Z | 2021-10-05T20:24:02Z | HIGH | 7.3 | {'CWE-287'} | {'https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/', 'https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269', 'http://www.openwall.com/lists/oss-security/2021/10/05/4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/... | null | {'https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269'} | {'https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269'} |
GHSA | GHSA-h77f-xxx7-4858 | User impersonation due to incorrect handling of the login JWT | ### Impact
<!--_What kind of vulnerability is it? Who is impacted?_-->
This allows anyone that can connect to the server to forge a LoginPacket with manipulated JWT token allowing impersonation as any Bedrock user. Unless credentials are saved in your configuration, online mode is not affected as users are still requir... | {'CVE-2021-39177'} | 2022-04-19T19:03:07Z | 2021-09-07T23:04:04Z | HIGH | 7.4 | {'CWE-287'} | {'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39177', 'https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY', 'https://github.com/advisories/GHSA-h77f-xxx7-4858', 'https://github.com/GeyserMC/Geyser/security/advisories/GHS... | null | {'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6'} | {'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6'} |
GHSA | GHSA-3wj8-vp9h-rm6m | Remote Code Execution (RCE) | The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set. | {'CVE-2021-23344'} | 2021-03-19T21:32:20Z | 2021-03-19T21:32:20Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23344', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069', 'https://github.com/advisories/GHSA-3wj8-vp9h-rm6m', 'https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04'} | null | {'https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04'} | {'https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04'} |
GHSA | GHSA-x4qx-4fjv-hmw6 | Integer overflow leading to crash in Tensorflow | ### Impact
The [implementation of `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273) can be made to crash a TensorFlow process by an integer overflow whose result is then used in a memory allocation:
```pyth... | {'CVE-2022-21738'} | 2022-02-11T16:22:50Z | 2022-02-09T23:45:09Z | MODERATE | 6.5 | {'CWE-190'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4qx-4fjv-hmw6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21738', 'https://github.com/advisories/GHSA-x4qx-4fjv-hmw6', 'https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a', 'https://github.com/tensorflow/tensorfl... | null | {'https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a'} | {'https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a'} |
GHSA | GHSA-xhv5-w9c5-2r2w | Unbounded connection acceptance in http4s-blaze-server | ### Impact
blaze-core, a library underlying http4s-blaze-server, accepts connections unboundedly on its selector pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each ... | {'CVE-2021-21294'} | 2021-02-09T18:51:45Z | 2021-02-02T21:42:56Z | HIGH | 0 | {'CWE-400'} | {'https://github.com/advisories/GHSA-xhv5-w9c5-2r2w', 'https://github.com/http4s/http4s/commit/987d6589ef79545b9bb2324ac4bdebf82d9a0171', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21294', 'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc', 'https://github.com/http4s/http4s/security/advisories/GH... | null | {'https://github.com/http4s/http4s/commit/987d6589ef79545b9bb2324ac4bdebf82d9a0171'} | {'https://github.com/http4s/http4s/commit/987d6589ef79545b9bb2324ac4bdebf82d9a0171'} |
GHSA | GHSA-g4rf-pc26-6hmr | OMERO webclient does not validate URL redirects on login or switching group. | ### Background
OMERO.web supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redirecting. External URLs are not considered valid, unless specified in the ``omero.web.r... | {'CVE-2021-21377'} | 2021-03-29T17:37:03Z | 2021-03-23T15:26:49Z | MODERATE | 0 | {'CWE-601'} | {'https://www.openmicroscopy.org/security/advisories/2021-SV2/', 'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c', 'https://pypi.org/project/omero-web/', 'https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr', 'https://github.com/advisories/GHSA-g4rf-pc26-6hmr', 'ht... | null | {'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'} | {'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'} |
GHSA | GHSA-vh5w-fg69-rc8m | Improper Input Validation in Google Closure Library | A URL parsing issue in goog.uri of the Google Closure Library versions up to and including v20200224 allows an attacker to send malicious URLs to be parsed by the library and return the wrong authority. Mitigation -- update your library to version v20200315. | {'CVE-2020-8910'} | 2021-05-07T16:06:34Z | 2021-05-07T16:06:34Z | MODERATE | 6.5 | {'CWE-20'} | {'https://github.com/google/closure-library/commit/294fc00b01d248419d8f8de37580adf2a0024fc9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8910', 'https://github.com/google/closure-library/releases/tag/v20200315', 'https://github.com/advisories/GHSA-vh5w-fg69-rc8m'} | null | {'https://github.com/google/closure-library/commit/294fc00b01d248419d8f8de37580adf2a0024fc9'} | {'https://github.com/google/closure-library/commit/294fc00b01d248419d8f8de37580adf2a0024fc9'} |
GHSA | GHSA-4rm3-4mq4-mfwr | Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons | A CSRF issue was discovered in web/authorization/oauth2/controller/OAuth2ClientController.java in hsweb 3.0.4 because the state parameter in the request is not compared with the state parameter in the session after user authentication is successful. | {'CVE-2018-20595'} | 2021-09-01T18:36:40Z | 2019-01-04T17:43:22Z | HIGH | 8.8 | {'CWE-352'} | {'https://github.com/advisories/GHSA-4rm3-4mq4-mfwr', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20595', 'https://github.com/hs-web/hsweb-framework/issues/107', 'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2'} | null | {'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2'} | {'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2'} |
GHSA | GHSA-5xjx-4xcm-hpcm | Prototype Pollution in ts-nodash | `ts-nodash` before version 1.2.7 is vulnerable to Prototype Pollution via the Merge() function due to lack of validation input. | {'CVE-2021-23403'} | 2021-12-10T18:53:42Z | 2021-12-10T18:53:42Z | HIGH | 7.3 | {'CWE-1321', 'CWE-915'} | {'https://github.com/advisories/GHSA-5xjx-4xcm-hpcm', 'https://github.com/BadOPCode/NoDash/blob/master/src/Merge.ts', 'https://github.com/BadOPCode/NoDash/commit/b9cc2b3b49f6cd5228e406bc57e17a28b998fea5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23403', 'https://snyk.io/vuln/SNYK-JS-TSNODASH-1311009'} | null | {'https://github.com/BadOPCode/NoDash/commit/b9cc2b3b49f6cd5228e406bc57e17a28b998fea5'} | {'https://github.com/BadOPCode/NoDash/commit/b9cc2b3b49f6cd5228e406bc57e17a28b998fea5'} |
GHSA | GHSA-c6rp-xvqv-mwmf | Cross-site Scripting in epubjs | managers/views/iframe.js in FuturePress EPub.js before 0.3.89 allows XSS. | {'CVE-2021-33040'} | 2022-01-21T23:52:17Z | 2022-01-21T23:52:17Z | HIGH | 0 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-33040', 'https://github.com/futurepress/epub.js/blob/5c7f21d648d9d20d44c6c365d164b16871847023/src/managers/views/iframe.js#L373', 'https://github.com/futurepress/epub.js/compare/v0.3.88...v0.3.89', 'https://github.com/futurepress/epub.js/commit/ab4dd46408cce0324e1c67de4a3ba96... | null | {'https://github.com/futurepress/epub.js/commit/ab4dd46408cce0324e1c67de4a3ba96b59e5012e'} | {'https://github.com/futurepress/epub.js/commit/ab4dd46408cce0324e1c67de4a3ba96b59e5012e'} |
GHSA | GHSA-74xw-82v7-hmrm | Improper Input Validation in python-dbusmock | python-dbusmock before version 0.15.1 AddTemplate() D-Bus method call or DBusTestCase.spawn_server_template() method could be tricked into executing malicious code if an attacker supplies a .pyc file. | {'CVE-2015-1326'} | 2021-08-03T17:42:37Z | 2019-04-23T16:04:36Z | HIGH | 8.8 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-1326', 'https://github.com/martinpitt/python-dbusmock/commit/4e7d0df9093', 'https://github.com/advisories/GHSA-74xw-82v7-hmrm'} | null | {'https://github.com/martinpitt/python-dbusmock/commit/4e7d0df9093'} | {'https://github.com/martinpitt/python-dbusmock/commit/4e7d0df9093'} |
GHSA | GHSA-q26w-wjj2-22vv | Cross-site scripting in Joplin | Joplin allows XSS via a LINK element in a note. | {'CVE-2020-28249'} | 2021-05-10T18:47:36Z | 2021-05-10T18:47:36Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28249', 'https://github.com/fhlip0/JopinXSS', 'https://www.npmjs.com/package/joplin', 'https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13', 'https://github.com/laurent22/joplin/releases/tag/v1.3.11', 'https://github.com/advisories/GHSA-q26w-wj... | null | {'https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13'} | {'https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13'} |
GHSA | GHSA-5vcm-3xc3-w7x3 | Response Splitting from unsanitized headers | ### Impact
http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields:
* Header names (`Header.name`å
* Header values (`Header.value`)
* Status reason phrases (`Status.reason`)
* URI paths (`Uri.Path`)
* URI authority registered name... | {'CVE-2021-41084'} | 2021-10-21T14:31:25Z | 2021-09-22T19:18:41Z | HIGH | 8.7 | {'CWE-918'} | {'https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://github.com/http4s/http4s/security/advisories/GHSA-5vcm-3xc3-w7x3', 'https://github.com/advisories/GHSA-5vcm-3xc3-w7x3', 'https://nvd.nist.gov/vuln/detail/CV... | null | {'https://github.com/http4s/http4s/commit/d02007db1da4f8f3df2dbf11f1db9ac7afc3f9d8'} | {'https://github.com/http4s/http4s/commit/d02007db1da4f8f3df2dbf11f1db9ac7afc3f9d8'} |
GHSA | GHSA-h2g5-2rhx-ffgj | Command injection in Weblate | Weblate is a web based localization tool with tight version control integration. Prior to version 4.11.1, Weblate didn't properly sanitize some arguments passed to Git and Mercurial, allowing them to change their behavior in an unintended way. Instances where untrusted users cannot create new components are not affecte... | {'CVE-2022-24727'} | 2022-03-17T21:37:32Z | 2022-03-05T00:00:44Z | HIGH | 0 | {'CWE-77'} | {'https://github.com/advisories/GHSA-h2g5-2rhx-ffgj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24727', 'https://github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842', 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj', 'https://github.com/WeblateOrg/weblate/commit... | null | {'https://github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8', 'https://github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842'} | {'https://github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8', 'https://github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842'} |
GHSA | GHSA-x752-qjv4-c4hc | Remote code injection in dompdf/dompdf | Dompdf is an HTML to PDF converter. Dompdf before 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file). | {'CVE-2022-28368'} | 2022-04-15T16:49:28Z | 2022-04-04T00:00:55Z | CRITICAL | 9.8 | {'CWE-74'} | {'https://github.com/dompdf/dompdf/pull/2808', 'https://github.com/snyk-labs/php-goof', 'https://github.com/advisories/GHSA-x752-qjv4-c4hc', 'https://snyk.io/blog/security-alert-php-pdf-library-dompdf-rce/', 'https://packagist.org/packages/dompdf/dompdf#v1.2.1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28368', 'https... | null | {'https://github.com/dompdf/dompdf/commit/4c70e1025bcd9b7694b95dd552499bd83cd6141d'} | {'https://github.com/dompdf/dompdf/commit/4c70e1025bcd9b7694b95dd552499bd83cd6141d'} |
GHSA | GHSA-r7q2-5gqg-6c7q | Moderate severity vulnerability that affects actionpack | The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability." | {'CVE-2011-2929'} | 2021-09-17T14:40:50Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-20'} | {'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'https://github.com/advisories/GHSA-r7q2-5gqg-6c7q', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://bugzilla.redhat.com/show_bug.cgi?id=731432', 'http... | null | {'https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552'} | {'https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552'} |
GHSA | GHSA-xx8f-qf9f-5fgw | Remote code execution in zendframework and laminas-http | Zend Framework 3.0.0 has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: the code may be related to Laminas Project laminas-http. Zend Framework is no longer supported by t... | {'CVE-2021-3007'} | 2021-06-08T20:11:19Z | 2021-06-08T20:11:19Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/laminas/laminas-http/releases/tag/2.14.2', 'https://github.com/advisories/GHSA-xx8f-qf9f-5fgw', 'https://github.com/laminas/laminas-http/pull/48', 'https://github.com/Ling-Yizhou/zendframework3-/blob/main/zend%20framework3%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%20rce.md', 'https://github.com/lamina... | null | {'https://github.com/laminas/laminas-http/commits/2.15.x/src/Response/Stream.php'} | {'https://github.com/laminas/laminas-http/commits/2.15.x/src/Response/Stream.php'} |
GHSA | GHSA-ghqm-pgxj-37gq | Moderate severity vulnerability that affects rails-html-sanitizer | Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node. | {'CVE-2015-7580'} | 2021-09-10T21:50:09Z | 2017-10-24T18:33:36Z | MODERATE | 6.1 | {'CWE-79'} | {'http://www.securitytracker.com/id/1034816', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580', 'https://github.com/rails/rails-html-sanitizer/co... | null | {'https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78'} | {'https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78'} |
GHSA | GHSA-8f9f-pc5v-9r5h | Malicious takeover of previously owned ENS names | ### Impact
A user who owns an ENS domain can set a "trapdoor", allowing them to transfer ownership to another user, and later regain ownership without the new owner's consent or awareness.
### Patches
A new ENS deployment is being rolled out that fixes this vulnerability in the ENS registry. The registry is newly dep... | {'CVE-2020-5232'} | 2021-01-08T20:31:47Z | 2020-01-30T23:55:04Z | CRITICAL | 8.7 | {'CWE-285'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5232', 'https://github.com/ensdomains/ens/commit/36e10e71fcddcade88646821e0a57cc6c19e1ecf', 'https://github.com/ensdomains/ens/security/advisories/GHSA-8f9f-pc5v-9r5h', 'https://github.com/advisories/GHSA-8f9f-pc5v-9r5h'} | null | {'https://github.com/ensdomains/ens/commit/36e10e71fcddcade88646821e0a57cc6c19e1ecf'} | {'https://github.com/ensdomains/ens/commit/36e10e71fcddcade88646821e0a57cc6c19e1ecf'} |
GHSA | GHSA-334p-wv2m-w3vp | Denial of service in Apache Xerces2 | XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the C... | {'CVE-2009-2625'} | 2021-08-30T14:20:43Z | 2020-06-15T18:51:30Z | MODERATE | 0 | null | {'http://www.mandriva.com/security/advisories?name=MDVSA-2011:108', 'http://www.ubuntu.com/usn/USN-890-1', 'http://www.vmware.com/security/advisories/VMSA-2009-0016.html', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html', 'http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.h... | null | {'https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b'} | {'https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b'} |
GHSA | GHSA-gpvv-69j7-gwj8 | Path Traversal in pip | The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committe... | {'CVE-2019-20916'} | 2022-04-21T15:43:34Z | 2021-06-09T17:35:04Z | HIGH | 7.5 | {'CWE-22'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html', 'https://github.com/advisories/GHSA-gpvv-69j7-gwj8', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/pypa/pip/issues/6413', 'https://nvd.nist... | null | {'https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace'} | {'https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace'} |
GHSA | GHSA-r628-mhmh-qjhw | Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning | ### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent... | {'CVE-2021-32803'} | 2022-03-11T21:27:16Z | 2021-08-03T19:00:40Z | HIGH | 8.2 | {'CWE-23', 'CWE-22'} | {'https://github.com/advisories/GHSA-r628-mhmh-qjhw', 'https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32803', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.npmjs.com/package/tar', 'https://cert-portal.siemens.com/productcert/... | null | {'https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20'} | {'https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20'} |
GHSA | GHSA-62gr-4qp9-h98f | Regular Expression Denial of Service in Handlebars | Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources. | {'CVE-2019-20922'} | 2022-02-10T20:38:22Z | 2022-02-10T20:38:22Z | HIGH | 7.5 | {'CWE-400'} | {'https://www.npmjs.com/advisories/1300', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20922', 'https://github.com/handlebars-lang/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b', 'https://github.com/advisories/GHSA-62gr-4qp9-h98f', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-480388', 'https://www.npmjs.com/p... | null | {'https://github.com/handlebars-lang/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b'} | {'https://github.com/handlebars-lang/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b'} |
GHSA | GHSA-g6ww-v8xp-vmwg | Prototype pollution in pathval | A prototype pollution vulnerability affects all versions of package pathval under 1.1.1. | {'CVE-2020-7751'} | 2022-04-18T21:58:50Z | 2022-02-10T20:21:24Z | HIGH | 7.2 | {'CWE-20', 'CWE-1321'} | {'https://github.com/advisories/GHSA-g6ww-v8xp-vmwg', 'https://github.com/chaijs/pathval/pull/58/commits/21a9046cfa0c2697cb41990f3b4316db410e6c8a', 'https://github.com/chaijs/pathval/pull/58/files', 'https://github.com/chaijs/pathval/releases/tag/v1.1.1', 'https://snyk.io/vuln/SNYK-JS-PATHVAL-596926', 'https://nvd.nist... | null | {'https://github.com/chaijs/pathval/pull/58/commits/21a9046cfa0c2697cb41990f3b4316db410e6c8a'} | {'https://github.com/chaijs/pathval/pull/58/commits/21a9046cfa0c2697cb41990f3b4316db410e6c8a'} |
GHSA | GHSA-c32w-3cqh-f6jx | Weak Password Recovery Mechanism for Forgotten Password | In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password. | {'CVE-2021-25957'} | 2021-10-21T14:15:19Z | 2021-09-02T17:08:33Z | HIGH | 8.8 | {'CWE-640'} | {'https://github.com/Dolibarr/dolibarr/commit/87f9530272925f0d651f59337a35661faeb6f377', 'https://github.com/advisories/GHSA-c32w-3cqh-f6jx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25957', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25957'} | null | {'https://github.com/Dolibarr/dolibarr/commit/87f9530272925f0d651f59337a35661faeb6f377'} | {'https://github.com/Dolibarr/dolibarr/commit/87f9530272925f0d651f59337a35661faeb6f377'} |
Go | GO-2020-0027 | null | After dropping and then elevating process privileges euid, guid, and groups
are not properly restored to their original values, allowing an unprivileged
user to gain membership in the root group.
| {'CVE-2018-6558'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/google/fscrypt/issues/77', 'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b'} | null | {'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b'} | {'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b'} |
Go | GHSA-9m95-8hx6-7p9v | Improper input validation in umoci | ### Impact
umoci 0.4.6 and earlier can be tricked into modifying host files by
creating a malicious layer that has a symlink with the name "." (or
"/"). Because umoci deletes inodes if they change types, this results in
the rootfs directory being replaced with an attacker-controlled symlink.
Subsequent image layers wi... | {'CVE-2021-29136'} | 2022-03-15T21:39:42Z | 2022-02-15T01:17:37Z | MODERATE | null | {'CWE-20'} | {'https://github.com/opencontainers/umoci/commit/d9efc31daf2206f7d3fdb839863cf7a576a2eb57', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29136', 'https://github.com/opencontainers/umoci/security/advisories/GHSA-9m95-8hx6-7p9v', 'http://www.openwall.com/lists/oss-security/2021/04/06/2'} | null | {'https://github.com/opencontainers/umoci/commit/d9efc31daf2206f7d3fdb839863cf7a576a2eb57'} | {'https://github.com/opencontainers/umoci/commit/d9efc31daf2206f7d3fdb839863cf7a576a2eb57'} |
Go | GO-2021-0083 | null | TLS certificate verification is skipped when connecting to a MQTT server.
This allows an attacker who can MITM the connection to read, or forge,
messages passed between the client and server.
| {'CVE-2019-12496'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/hybridgroup/gobot/releases/tag/v1.13.0', 'https://github.com/hybridgroup/gobot/commit/c1aa4f867846da4669ecf3bc3318bd96b7ee6f3f'} | null | {'https://github.com/hybridgroup/gobot/commit/c1aa4f867846da4669ecf3bc3318bd96b7ee6f3f'} | {'https://github.com/hybridgroup/gobot/commit/c1aa4f867846da4669ecf3bc3318bd96b7ee6f3f'} |
Go | GHSA-grfp-q2mm-hfp6 | Redirect URL matching ignores character casing | ### Impact
Before version v0.34.1, the OAuth 2.0 Client's registered redirect URLs and the redirect URL provided at the OAuth2 Authorization Endpoint where compared using `strings.ToLower` while they should have been compared with a simple string match:
1. Registering a client with allowed redirect URL `https://examp... | {'CVE-2020-15234'} | 2021-11-19T14:43:47Z | 2021-05-24T17:00:05Z | MODERATE | null | {'CWE-20', 'CWE-601', 'CWE-178'} | {'https://github.com/ory/fosite', 'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf', 'https://github.com/ory/fosite/security/advisories/GHSA-grfp-q2mm-hfp6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15234'} | null | {'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf'} | {'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf'} |
Go | GHSA-p55x-7x9v-q8m4 | Denial of Service in miekg-dns | A denial of service flaw was found in miekg-dns before 1.0.4. A remote attacker could use carefully timed TCP packets to block the DNS server from accepting new connections. | {'CVE-2017-15133'} | 2021-05-20T20:59:20Z | 2021-06-29T21:45:07Z | HIGH | null | {'CWE-400'} | {'https://github.com/miekg/dns/pull/631', 'https://github.com/miekg/dns/issues/627', 'https://bugzilla.redhat.com/show_bug.cgi?id=1538763', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15133', 'https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e'} | null | {'https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e'} | {'https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e'} |
Go | GHSA-w942-gw6m-p62c | Denial of service in GJSON | GJSON before 1.6.4 allows attackers to cause a denial of service via crafted JSON. | {'CVE-2020-35380'} | 2021-05-12T21:50:06Z | 2021-06-23T17:53:05Z | HIGH | null | {'CWE-400'} | {'https://github.com/tidwall/gjson/issues/192', 'https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35380'} | null | {'https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc'} | {'https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc'} |
Go | GHSA-c3h9-896r-86jm | Improper Input Validation in GoGo Protobuf | An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue. | {'CVE-2021-3121'} | 2022-03-28T20:28:00Z | 2022-03-28T20:28:00Z | HIGH | null | {'CWE-20', 'CWE-129'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3121', 'https://discuss.hashicorp.com/t/hcsec-2021-23-consul-exposed-to-denial-of-service-in-gogo-protobuf-dependency/29025', 'https://lists.apache.org/thread.html/r88d69555cb74a129a7bf84838073b61259b4a3830190e05a3b87994e@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apach... | null | {'https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc'} | {'https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc'} |
Go | GHSA-qqxw-m5fj-f7gv | The pattern '/\domain.com' is not disallowed when redirecting, allowing for open redirect | ### Impact
An open redirect vulnerability has been found in `oauth2_proxy`. Anyone who uses `oauth2_proxy` may potentially be impacted.
For a context [detectify] have an in depth blog post about the potential impact of an open redirect. Particularly see the OAuth section.
**tl;dr**: People's authentication tokens co... | {'CVE-2020-5233'} | 2021-05-24T21:20:17Z | 2021-12-20T18:02:38Z | MODERATE | null | {'CWE-601'} | {'https://github.com/oauth2-proxy/oauth2_proxy/commit/a316f8a06f3c0ca2b5fc5fa18a91781b313607b2', 'https://github.com/oauth2-proxy/oauth2_proxy/releases/tag/v5.0.0', 'https://blog.detectify.com/2019/05/16/the-real-impact-of-an-open-redirect/', 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-qqxw-m... | null | {'https://github.com/oauth2-proxy/oauth2_proxy/commit/a316f8a06f3c0ca2b5fc5fa18a91781b313607b2'} | {'https://github.com/oauth2-proxy/oauth2_proxy/commit/a316f8a06f3c0ca2b5fc5fa18a91781b313607b2'} |
Go | GHSA-3f8r-4qwm-r7jf | Improper Authentication in Apache Traffic Control | Improper authentication is possible in Apache Traffic Control versions 3.0.0 and 3.0.1 if LDAP is enabled for login in the Traffic Ops API component. Given a username for a user that can be authenticated via LDAP, it is possible to improperly authenticate as that user without that user's correct password. | {'CVE-2019-12405'} | 2021-10-13T17:25:40Z | 2021-05-18T15:39:16Z | CRITICAL | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-12405', 'https://github.com/apache/trafficcontrol', 'https://lists.apache.org/thread.html/rc8bfd7d4f71d61e9193efcd4699eccbab3c202ec1d75ed9d502f08bf@%3Ccommits.trafficcontrol.apache.org%3E', 'https://lists.apache.org/thread.html/e128e9d382f3b0d074e2b597ac58e1d92139394509d81ddb... | null | {'https://github.com/apache/trafficcontrol/commit/f780aff77a52d52a37b4d1cc3e8e801c0b557356'} | {'https://github.com/apache/trafficcontrol/commit/f780aff77a52d52a37b4d1cc3e8e801c0b557356'} |
Go | GHSA-8j3f-mhq8-gmh4 | Reject unauthorized access with GitHub PATs | ### Impact
_What kind of vulnerability is it? Who is impacted?_
The additional auth mechanism added within https://github.com/go-vela/server/pull/246 enables some malicious user to obtain secrets utilizing the injected credentials within the `~/.netrc` file. Steps to reproduce
1. Create Vela server
2. Login to Vela U... | {'CVE-2021-21432'} | 2021-05-20T20:12:26Z | 2022-02-15T01:57:18Z | HIGH | null | {'CWE-863', 'CWE-285'} | {'https://github.com/go-vela/server/pull/337', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21432', 'https://github.com/go-vela/server/releases/tag/v0.7.5', 'https://pkg.go.dev/github.com/go-vela/server', 'https://github.com/go-vela/server/commit/cb4352918b8ecace9fe969b90404d337b0744d46', 'https://github.com/go-vela/serv... | null | {'https://github.com/go-vela/server/commit/cb4352918b8ecace9fe969b90404d337b0744d46'} | {'https://github.com/go-vela/server/commit/cb4352918b8ecace9fe969b90404d337b0744d46'} |
Go | GO-2020-0031 | null | Due to improper setting of finalizers, memory passed to C may be freed before it is used,
leading to crashes due to memory corruption or possible code execution.
| {'CVE-2020-8945'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733', 'https://bugzilla.redhat.com/show_bug.cgi?id=1795838'} | null | {'https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733'} | {'https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733'} |
Go | GO-2021-0095 | null | Due to repeated usage of a XOR key an attacker that can eavesdrop on the TPM 1.2 transport
is able to calculate usageAuth for keys created using CreateWrapKey, despite it being encrypted,
allowing them to use the created key.
| {'CVE-2020-8918'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/google/go-tpm/pull/195', 'https://github.com/google/go-tpm/commit/d7806cce857a1a020190c03348e5361725d8f141', 'https://github.com/google/go-tpm/security/advisories/GHSA-5x29-3hr9-6wpw'} | null | {'https://github.com/google/go-tpm/commit/d7806cce857a1a020190c03348e5361725d8f141'} | {'https://github.com/google/go-tpm/commit/d7806cce857a1a020190c03348e5361725d8f141'} |
Go | GHSA-5v95-v8c8-3rh6 | Privilege escalation in rbac | ### Impact
Using a carefully crafted request or malicious proxy, a user with `UserWrite` permissions could create another user with higher privileges than their own due to insufficient checks on the allowed set of permissions. The event would be captured in the Event Log.
### Patches
The issue has been fixed in 0.24.0... | {'CVE-2021-22538'} | 2021-05-20T22:26:21Z | 2021-05-21T14:32:55Z | HIGH | null | {'CWE-276'} | {'https://github.com/google/exposure-notifications-verification-server/security/advisories/GHSA-5v95-v8c8-3rh6', 'https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.24.0', 'https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.23.1', 'https://github.com/g... | null | {'https://github.com/google/exposure-notifications-verification-server/commit/eb8cf40b12dbe79304f1133c06fb73419383cd95'} | {'https://github.com/google/exposure-notifications-verification-server/commit/eb8cf40b12dbe79304f1133c06fb73419383cd95'} |
Go | GHSA-9423-6c93-gpp8 | Arbitrary File Write via Archive Extraction (Zip Slip) | The CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. Note, the fixing commit was applied to all affected versions which were re-released. | {'CVE-2020-7667'} | 2022-01-04T19:27:35Z | 2021-06-23T17:13:29Z | HIGH | null | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7667', 'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0', 'https://github.com/sassoftware/go-rpmutils'} | null | {'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0'} | {'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0'} |
Go | GHSA-gw5h-h6hj-f56g | Improper Authorization in Gogs | ### Impact
Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as authentication sources are affected.
### Patches
Expired PAM accounts and accounts with expired passwords are no longer being seen as valid. Users should upgrade to 0.12.5 or the latest 0.1... | null | 2022-03-14T22:58:37Z | 2022-03-14T22:58:37Z | HIGH | null | {'CWE-285'} | {'https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62', 'https://github.com/gogs/gogs/security/advisories/GHSA-gw5h-h6hj-f56g', 'https://github.com/gogs/gogs', 'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78'} | null | {'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78'} | {'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78'} |
Go | GO-2021-0056 | null | Due to the behavior of encoding/xml, a crafted XML document may cause
XML Digital Signature validation to be entirely bypassed, causing an
unsigned document to appear signed.
| {'CVE-2020-15216'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5', 'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8'} | null | {'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8'} | {'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8'} |
Go | GHSA-mvff-h3cj-wj9c | Unprivileged pod using `hostPath` can side-step active LSM when it is SELinux | ### Impact
Containers launched through containerd’s CRI implementation on Linux systems which use the SELinux security module and containerd versions since v1.5.0 can cause arbitrary files and directories on the host to be relabeled to match the container process label through the use of specially-configured bind moun... | {'CVE-2021-43816'} | 2022-04-04T20:40:33Z | 2022-01-06T17:36:59Z | HIGH | null | {'CWE-281'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD5GH7NMK5VJMA2Y5CYB5O5GTPYMWMLX/', 'https://github.com/containerd/containerd/security/advisories/GHSA-mvff-h3cj-wj9c', 'https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea', 'https://gi... | null | {'https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea', 'https://github.com/dweomer/containerd/commit/f7f08f0e34fb97392b0d382e58916d6865100299'} | {'https://github.com/dweomer/containerd/commit/f7f08f0e34fb97392b0d382e58916d6865100299', 'https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea'} |
Go | GHSA-9cwv-cppx-mqjm | Improper Authentication in Capsule Proxy | ### Impact
Using a malicious `Connection` header, an attacker with a proper authentication mechanism could start a privilege escalation towards the Kubernetes API Server, being able to exploit the `cluster-admin` Role bound to `capsule-proxy`.
### Patches
Patch has been merged in the v0.2.1 release.
### Workarounds... | {'CVE-2022-23652'} | 2022-02-25T15:39:14Z | 2022-02-23T21:17:25Z | HIGH | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23652', 'https://github.com/clastix/capsule-proxy/', 'https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8', 'https://github.com/clastix/capsule-proxy/security/advisories/GHSA-9cwv-cppx-mqjm', 'https://github.com/clastix/capsule-proxy/issue... | null | {'https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8'} | {'https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8'} |
Go | GHSA-399h-cmvp-qgx5 | Incorrect Default Permissions in Binance tss-lib | The keygen protocol implementation in Binance tss-lib before 1.2.0 allows attackers to generate crafted h1 and h2 parameters in order to compromise a signing round or obtain sensitive information from other parties. | {'CVE-2020-12118'} | 2021-05-25T20:16:35Z | 2021-06-29T21:32:11Z | HIGH | null | {'CWE-276'} | {'https://github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311', 'https://github.com/binance-chain/tss-lib/pull/89', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12118', 'https://github.com/binance-chain/tss-lib/releases/tag/v1.2.0'} | null | {'https://github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311'} | {'https://github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311'} |
Go | GO-2021-0105 | null | Due to an incorrect state calculation, a specific set of transactions could cause a consensus disagreement,
causing users of this package to reject a canonical chain.
| {'CVE-2020-26265'} | 2021-07-28T12:00:00Z | 2021-07-28T12:00:00Z | null | null | null | {'https://github.com/ethereum/go-ethereum/commit/87c0ba92136a75db0ab2aba1046d4a9860375d6a', 'https://github.com/advisories/GHSA-xw37-57qp-9mm4', 'https://github.com/ethereum/go-ethereum/pull/21080'} | null | {'https://github.com/ethereum/go-ethereum/commit/87c0ba92136a75db0ab2aba1046d4a9860375d6a'} | {'https://github.com/ethereum/go-ethereum/commit/87c0ba92136a75db0ab2aba1046d4a9860375d6a'} |
Go | GO-2021-0060 | null | Due to the behavior of encoding/xml, a crafted XML document may cause
XML Digital Signature validation to be entirely bypassed, causing an
unsigned document to appear signed.
| {'CVE-2020-29509'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/russellhaering/gosaml2/commit/42606dafba60c58c458f14f75c4c230459672ab9', 'https://github.com/russellhaering/gosaml2/security/advisories/GHSA-xhqq-x44f-9fgg'} | null | {'https://github.com/russellhaering/gosaml2/commit/42606dafba60c58c458f14f75c4c230459672ab9'} | {'https://github.com/russellhaering/gosaml2/commit/42606dafba60c58c458f14f75c4c230459672ab9'} |
Go | GHSA-5ph6-qq5x-7jwc | ExternalName Services can be used to gain access to Envoy's admin interface | ### Impact
Josh Ferrell (@josh-ferrell) from VMware has reported that a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy remotely (a denial of service), or to expose the... | {'CVE-2021-32783'} | 2021-08-30T16:53:38Z | 2021-08-30T17:22:10Z | HIGH | null | {'CWE-610'} | {'https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e', 'https://github.com/projectcontour/contour/releases/tag/v1.16.1', 'https://github.com/projectcontour/contour/security/advisories/GHSA-5ph6-qq5x-7jwc', 'https://github.com/projectcontour/contour/commit/5f3e6d0ab1d48e64bae46400c... | null | {'https://github.com/projectcontour/contour/commit/5f3e6d0ab1d48e64bae46400c85c490b200393a3', 'https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e'} | {'https://github.com/projectcontour/contour/commit/5f3e6d0ab1d48e64bae46400c85c490b200393a3', 'https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e'} |
Go | GHSA-mx43-r985-5h4m | Open redirect vulnerability in Sourcegraph | ### Impact
An open redirect vulnerability that allows users to be targeted for phishing attacks has been found in Sourcegraph instances configured with OAuth, OpenID, or SAML authentication enabled. Users targeted by these phishing attacks could have their authentication tokens silently harvested by an attacker.
### ... | {'CVE-2020-12283'} | 2021-12-09T19:40:01Z | 2021-12-20T18:12:47Z | MODERATE | null | {'CWE-601'} | {'https://github.com/sourcegraph/sourcegraph/blob/master/CHANGELOG.md', 'https://github.com/sourcegraph/sourcegraph/pull/10167', 'https://github.com/sourcegraph/sourcegraph/commit/c0f48172e815c7f66471a38f0a06d1fc32a77a64', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12283', 'https://github.com/sourcegraph/sourcegraph', ... | null | {'https://github.com/sourcegraph/sourcegraph/commit/c0f48172e815c7f66471a38f0a06d1fc32a77a64'} | {'https://github.com/sourcegraph/sourcegraph/commit/c0f48172e815c7f66471a38f0a06d1fc32a77a64'} |
Go | GHSA-g6xv-8q23-w2q3 | SQL Injection in Gogs | Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly han... | {'CVE-2014-8682'} | 2021-05-20T16:59:51Z | 2021-06-29T18:32:48Z | HIGH | null | {'CWE-89'} | {'http://seclists.org/fulldisclosure/2014/Nov/31', 'http://www.securityfocus.com/archive/1/533995/100/0/threaded', 'http://seclists.org/fulldisclosure/2014/Nov/33', 'https://github.com/gogits/gogs/releases/tag/v0.5.8', 'http://gogs.io/docs/intro/change_log.html', 'http://packetstormsecurity.com/files/129116/Gogs-Label-... | null | {'https://github.com/gogits/gogs/commit/0c5ba4573aecc9eaed669e9431a70a5d9f184b8d'} | {'https://github.com/gogits/gogs/commit/0c5ba4573aecc9eaed669e9431a70a5d9f184b8d'} |
Go | GHSA-gh32-pc56-4c96 | Information Exposure in jaegar | Sensitive information written to a log file vulnerability was found in jaegertracing/jaeger before version 1.18.1 when the Kafka data store is used. This flaw allows an attacker with access to the container's log file to discover the Kafka credentials. | {'CVE-2020-10750'} | 2021-05-12T14:55:16Z | 2021-05-18T18:35:02Z | LOW | null | {'CWE-532', 'CWE-200'} | {'https://github.com/jaegertracing/jaeger/releases/tag/v1.18.1', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10750', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10750', 'https://bugzilla.redhat.com/show_bug.cgi?id=1838401', 'https://github.com/jaegertracing/jaeger/commit/360c38bec3f9718ebba7ddbf0b409b05995f3ac... | null | {'https://github.com/jaegertracing/jaeger/commit/360c38bec3f9718ebba7ddbf0b409b05995f3ace'} | {'https://github.com/jaegertracing/jaeger/commit/360c38bec3f9718ebba7ddbf0b409b05995f3ace'} |
Go | GO-2021-0076 | null | A malicious JSON patch can cause a panic due to an out-of-bounds
write attempt. This can be used as a denial of service vector if
exposed to arbitary user input.
| {'CVE-2018-14632'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/evanphx/json-patch/commit/4c9aadca8f89e349c999f04e28199e96e81aba03', 'https://github.com/evanphx/json-patch/pull/57'} | null | {'https://github.com/evanphx/json-patch/commit/4c9aadca8f89e349c999f04e28199e96e81aba03'} | {'https://github.com/evanphx/json-patch/commit/4c9aadca8f89e349c999f04e28199e96e81aba03'} |
Go | GO-2021-0099 | null | Due to improper path validation, using the github.com/deislabs/oras/pkg/content.FileStore
content store may result in directory traversal during archive extraction, allowing a
malicious archive to write paths to arbitary paths that the process can write to.
| {'CVE-2021-21272'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e', 'https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx'} | null | {'https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e'} | {'https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e'} |
Go | GHSA-69v6-xc2j-r2jf | Shallow copy bug in geth | ### Impact
This is a Consensus vulnerability, which can be used to cause a chain-split where vulnerable nodes reject the canonical chain.
Geth’s pre-compiled `dataCopy` (at `0x00...04`) contract did a shallow copy on invocation. An attacker could deploy a contract that
- writes `X` to an EVM memory region `R`,
- ca... | {'CVE-2020-26241'} | 2021-05-21T21:51:49Z | 2021-06-29T21:13:01Z | MODERATE | null | {'CWE-682'} | {'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-69v6-xc2j-r2jf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26241', 'https://blog.ethereum.org/2020/11/12/geth_security_release/', 'https://github.com/ethereum/go-ethereum/commit/295693759e5ded05fec0b2fb39359965b60da785'} | null | {'https://github.com/ethereum/go-ethereum/commit/295693759e5ded05fec0b2fb39359965b60da785'} | {'https://github.com/ethereum/go-ethereum/commit/295693759e5ded05fec0b2fb39359965b60da785'} |
Go | GHSA-ppj4-34rq-v8j9 | regular expression denial of service in gjson | GJSON is a Go package that provides a fast and simple way to get values from a json document. GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack. | {'CVE-2021-42836'} | 2022-05-04T03:43:44Z | 2021-10-25T19:43:15Z | HIGH | null | {'CWE-1333', 'CWE-400', 'CWE-697'} | {'https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96', 'https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944', 'https://github.com/tidwall/gjson/issues/236', 'https://github.com/tidwall/gjson/issues/237', 'https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3... | null | {'https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944', 'https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96'} | {'https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96', 'https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944'} |
Go | GHSA-28r6-jm5h-mrgg | Access control bypass in Beego | An issue was discovered in the route lookup process in beego through 2.0.1, allows attackers to bypass access control. | {'CVE-2021-30080'} | 2022-04-07T18:13:46Z | 2022-04-06T00:01:30Z | HIGH | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2021-30080', 'https://github.com/beego/beego/commit/d5df5e470d0a8ed291930ae802fd7e6b95226519', 'https://github.com/beego/beego'} | null | {'https://github.com/beego/beego/commit/d5df5e470d0a8ed291930ae802fd7e6b95226519'} | {'https://github.com/beego/beego/commit/d5df5e470d0a8ed291930ae802fd7e6b95226519'} |
Go | GHSA-9jcx-pr2f-qvq5 | Denial of Service (DoS) | An issue was discovered in setTA in scan_rr.go in the Miek Gieben DNS library before 1.0.10 for Go. A dns.ParseZone() parsing error causes a segmentation violation, leading to denial of service. | {'CVE-2018-17419'} | 2021-05-11T00:44:23Z | 2021-05-18T18:34:25Z | HIGH | null | {'CWE-400'} | {'https://github.com/miekg/dns/commit/501e858f679edecd4a38a86317ce50271014a80d', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17419', 'https://github.com/miekg/dns/issues/742'} | null | {'https://github.com/miekg/dns/commit/501e858f679edecd4a38a86317ce50271014a80d'} | {'https://github.com/miekg/dns/commit/501e858f679edecd4a38a86317ce50271014a80d'} |
Go | GO-2020-0011 | null | When decrypting JsonWebEncryption objects with multiple recipients
or JsonWebSignature objects with multiple signatures the Decrypt
and Verify methods do not indicate which recipient or signature was
valid. This may lead a caller to rely on protected headers from an
invalid recipient or signature.
| {'CVE-2016-9122'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6', 'https://www.openwall.com/lists/oss-security/2016/11/03/1'} | null | {'https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6'} | {'https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6'} |
Go | GHSA-7f33-f4f5-xwgw | In-band key negotiation issue in AWS S3 Crypto SDK for golang | ### Summary
The golang AWS S3 Crypto SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the bucket in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when e... | {'CVE-2020-8912'} | 2021-05-24T18:08:44Z | 2022-02-11T23:23:13Z | LOW | null | {'CWE-327'} | {'https://github.com/aws/aws-sdk-go/commit/1e84382fa1c0086362b5a4b68e068d4f8518d40e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8912', 'https://github.com/aws/aws-sdk-go/pull/3403', 'https://github.com/sophieschmieg/exploits/tree/master/aws_s3_crypto_poc', 'https://aws.amazon.com/blogs/developer/updates-to-the-amazon-... | null | {'https://github.com/aws/aws-sdk-go/commit/1e84382fa1c0086362b5a4b68e068d4f8518d40e', 'https://github.com/aws/aws-sdk-go/commit/ae9b9fd92af132cfd8d879809d8611825ba135f4'} | {'https://github.com/aws/aws-sdk-go/commit/1e84382fa1c0086362b5a4b68e068d4f8518d40e', 'https://github.com/aws/aws-sdk-go/commit/ae9b9fd92af132cfd8d879809d8611825ba135f4'} |
Go | GHSA-6cp7-g972-w9m9 | Use of a Key Past its Expiration Date and Insufficient Session Expiration in Maddy Mail Server | ### Impact
Any configuration on any maddy version <0.5.4 using auth.pam is affected.
No password expiry or account expiry checking is done when authenticating using PAM.
### Patches
Patch is available as part of the 0.5.4 release.
### Workarounds
If /etc/shadow authentication is used, it is possible to replace au... | {'CVE-2022-24732'} | 2022-03-18T20:12:30Z | 2022-03-07T16:59:31Z | MODERATE | null | {'CWE-324', 'CWE-613'} | {'https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583', 'https://github.com/foxcpp/maddy/releases/tag/v0.5.4', 'https://github.com/foxcpp/maddy', 'https://github.com/foxcpp/maddy/security/advisories/GHSA-6cp7-g972-w9m9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24732'} | null | {'https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583'} | {'https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583'} |
Go | GO-2021-0109 | null | Due to improper error handling, an error with the underlying token storage may cause a user
to believe a token has been successfully revoked when it is in fact still valid. An attackers
ability to exploit this relies on an ability to trigger errors in the underlying storage.
| {'CVE-2020-15223'} | 2021-07-28T12:00:00Z | 2021-07-28T12:00:00Z | null | null | null | {'https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319', 'https://github.com/advisories/GHSA-7mqr-2v3q-v2wm'} | null | {'https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319'} | {'https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319'} |
Go | GO-2020-0007 | null | Filters containing rules with multiple syscall arguments are improperly
constructed, such that all arguments are required to match rather than
any of the arguments (AND is used rather than OR). These filters can be
bypassed by only specifying a subset of the arguments due to this
behavior.
| {'CVE-2017-18367'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e'} | null | {'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e'} | {'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e'} |
Go | GHSA-47wr-426j-fr82 | Symbolic links in an unpacking routine may enable attackers to read and/or write to arbitrary locations in dbdeployer | ### Impact
_Users unpacking a tarball through dbdeployer may use a maliciously packaged tarball that contains symlinks to files external to the target. In such scenario, an attacker could induce dbdeployer to write into a system file, thus altering the computer defences._
### Mitigating factors
For the attach to succe... | {'CVE-2020-26277'} | 2021-05-21T18:35:39Z | 2022-02-12T00:14:07Z | MODERATE | null | {'CWE-59'} | {'https://github.com/datacharmer/dbdeployer/security/advisories/GHSA-47wr-426j-fr82', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26277', 'https://github.com/datacharmer/dbdeployer/commit/548e256c1de2f99746e861454e7714ec6bc9bb10'} | null | {'https://github.com/datacharmer/dbdeployer/commit/548e256c1de2f99746e861454e7714ec6bc9bb10'} | {'https://github.com/datacharmer/dbdeployer/commit/548e256c1de2f99746e861454e7714ec6bc9bb10'} |
Go | GHSA-7gcp-w6ww-2xv9 | Path traversal and files overwrite with unsquashfs in singularity | ### Impact
Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs` (a distribution provided utility used by Singularity), it is possible to overwrite/create any files on the host filesystem during the extraction of a crafted squashfs filesystem.
Squashfs extraction occurs auto... | {'CVE-2020-15229'} | 2021-05-21T22:17:06Z | 2021-05-24T16:59:53Z | HIGH | null | {'CWE-22'} | {'https://github.com/hpcng/singularity/blob/v3.6.4/CHANGELOG.md#security-related-fixes', 'https://github.com/hpcng/singularity/pull/5611', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00071.html', 'https://nvd.nist.gov/vul... | null | {'https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e'} | {'https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e'} |
Go | GHSA-6635-c626-vj4r | Command Injection Vulnerability with Mercurial in VCS | URLs and local file paths passed to the Mercurial (hg) APIs that are specially crafted can contain commands which are executed by Mercurial if it is installed on the host operating system. The `vcs` package uses the underly version control system, in this case `hg`, to implement the needed functionality. When `hg` is e... | {'CVE-2022-21235'} | 2022-04-18T21:47:33Z | 2022-04-01T14:05:33Z | CRITICAL | null | {'CWE-88', 'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21235', 'https://github.com/Masterminds/vcs/security/advisories/GHSA-6635-c626-vj4r', 'https://github.com/Masterminds/vcs/commit/922a5122330ea8fbe56352a0172ddb6bf019cd22', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSVCS-2437078', 'https://github.com/Masterminds/vcs/... | null | {'https://github.com/Masterminds/vcs/commit/922a5122330ea8fbe56352a0172ddb6bf019cd22'} | {'https://github.com/Masterminds/vcs/commit/922a5122330ea8fbe56352a0172ddb6bf019cd22'} |
Go | GHSA-fpv6-f8jw-rc3r | Remote code execution via the web UI backend | ### Impact
Elvish's backend for the experimental web UI (started by `elvish -web`) hosts an endpoint that allows executing the code sent from the web UI.
The backend does not check the origin of requests correctly. As a result, if the user has the web UI backend open and visits a compromised or malicious website, the... | {'CVE-2021-41088'} | 2021-09-23T21:06:47Z | 2021-09-23T23:17:33Z | MODERATE | null | {'CWE-668'} | {'https://github.com/elves/elvish/commit/ccc2750037bbbfafe9c1b7a78eadd3bd16e81fe5', 'https://github.com/elves/elvish/security/advisories/GHSA-fpv6-f8jw-rc3r', 'https://github.com/elves/elvish', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41088'} | null | {'https://github.com/elves/elvish/commit/ccc2750037bbbfafe9c1b7a78eadd3bd16e81fe5'} | {'https://github.com/elves/elvish/commit/ccc2750037bbbfafe9c1b7a78eadd3bd16e81fe5'} |
Go | GO-2020-0050 | null | Due to the behavior of encoding/xml, a crafted XML document may cause
XML Digital Signature validation to be entirely bypassed, causing an
unsigned document to appear signed.
| {'CVE-2020-15216'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64', 'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7'} | null | {'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64'} | {'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64'} |
Go | GHSA-x27w-qxhg-343v | Access Restriction Bypass in go-ldap | In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go, an attacker may be able to login with an empty password. This issue affects an application using this package if these conditions are met: (1) it relies only on the return error of the Bind function call to determine whether a user is authorized (i.e., a nil re... | {'CVE-2017-14623'} | 2021-05-20T17:02:56Z | 2022-02-15T01:57:18Z | HIGH | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-14623', 'https://github.com/go-ldap/ldap/pull/126', 'https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66'} | null | {'https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66'} | {'https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66'} |
Go | GHSA-9qq2-xhmc-h9qr | Access Control Bypass | An issue was discovered in Rancher 2 through 2.1.5. Any project member with access to the default namespace can mount the netes-default service account in a pod, and then use that pod to execute administrative privileged commands against the k8s cluster. This could be mitigated by isolating the default namespace in a s... | {'CVE-2018-20321'} | 2022-04-25T20:20:41Z | 2021-06-23T17:57:10Z | MODERATE | null | {'CWE-288', 'CWE-668'} | {'https://rancher.com/blog/2019/2019-01-29-explaining-security-vulnerabilities-addressed-in-rancher-v2-1-6-and-v2-0-11/', 'https://github.com/rancher/rancher/commit/6ea187fcc2309d5a7a14ed47de5688bf6573f448', 'https://github.com/rancher/rancher', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20321', 'https://github.com/ran... | null | {'https://github.com/rancher/rancher/commit/6ea187fcc2309d5a7a14ed47de5688bf6573f448'} | {'https://github.com/rancher/rancher/commit/6ea187fcc2309d5a7a14ed47de5688bf6573f448'} |
Go | GHSA-c2h3-6mxw-7mvq | Insufficiently restricted permissions on plugin directories | ### Impact
A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setui... | {'CVE-2021-41103'} | 2021-10-15T17:31:03Z | 2021-10-04T20:14:47Z | MODERATE | null | {'CWE-22'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41103', 'https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8', 'https://github.com/containerd/containerd', ... | null | {'https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8'} | {'https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8'} |
Go | GHSA-v3q9-2p3m-7g43 | Token reuse in github.com/ory/fosite | ### Impact
When using client authentication method "private_key_jwt" [1], OpenId specification says the following about assertion `jti`:
> A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the pa... | {'CVE-2020-15222'} | 2021-11-19T15:24:07Z | 2021-05-24T16:57:52Z | HIGH | null | {'CWE-345', 'CWE-287'} | {'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9', 'https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43', 'https://github.com/ory/fosite', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15222', 'https://github.com/ory/fosite/releases/tag/v0.31.0', 'https://openid.net/specs/o... | null | {'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9'} | {'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9'} |
Go | GO-2020-0006 | null | An attacker may prevent TCP connections to a [`Server`][] by opening
a connection and leaving it idle, until the connection is closed by
the server no other connections will be accepted.
| {'CVE-2017-15133'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/miekg/dns/pull/631', 'https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e'} | null | {'https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e'} | {'https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e'} |
Go | GHSA-jhj6-5mh6-4pvf | Denial-of-Service within Docker container | ### Impact
If you run teler inside a Docker container and encounter `errors.Exit` function, it will cause denial-of-service (`SIGSEGV`) because it doesn't get process ID and process group ID of teler properly to kills.
### Patches
Upgrade to the >= 0.0.1 version.
### Workarounds
N/A
### References
- https://github.c... | {'CVE-2020-26213'} | 2021-10-06T21:44:05Z | 2021-05-24T17:00:46Z | MODERATE | null | {'CWE-476'} | {'https://github.com/kitabisa/teler', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26213', 'https://github.com/kitabisa/teler/security/advisories/GHSA-jhj6-5mh6-4pvf', 'https://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7e'} | null | {'https://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7e'} | {'https://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7e'} |
Go | GHSA-733f-44f3-3frw | Open redirect | macaron before 1.3.7 has an open redirect in the static handler, as demonstrated by the http://127.0.0.1:4000//example.com/ URL. | {'CVE-2020-12666'} | 2021-05-18T20:50:16Z | 2021-05-18T21:08:35Z | MODERATE | null | {'CWE-601'} | {'https://github.com/go-macaron/macaron/pull/199/commits/6bd9385542f7133467ab7d09a5f28f7d5dc52af7', 'https://github.com/go-macaron/macaron/releases/tag/v1.3.7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12666', 'https://github.com/go-macaron/macaron/issues/198', 'https://github.com/go-macaron/macaron/issues/198#issuec... | null | {'https://github.com/go-macaron/macaron/pull/199/commits/6bd9385542f7133467ab7d09a5f28f7d5dc52af7'} | {'https://github.com/go-macaron/macaron/pull/199/commits/6bd9385542f7133467ab7d09a5f28f7d5dc52af7'} |
Go | GHSA-h74j-692g-48mq | Path Traversal in MHolt Archiver | All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final... | {'CVE-2019-10743'} | 2021-05-17T21:21:43Z | 2021-05-18T15:31:53Z | MODERATE | null | {'CWE-29'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10743', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728,', 'https://github.com/mholt/archiver/pull/169', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/mholt/archiver/pull/203', 'https://github.com/mholt/archiver/commit/8217ed3a206... | null | {'https://github.com/mholt/archiver/commit/8217ed3a206c0473b4ec1aff51375b398838073a'} | {'https://github.com/mholt/archiver/commit/8217ed3a206c0473b4ec1aff51375b398838073a'} |
Go | GO-2021-0108 | null | Due to improper input sanitization, a maliciously constructed filename could cause a file
download to use an attacker controlled filename, as well as injecting additional headers
into a HTTP response.
| {'CVE-2020-15111'} | 2021-07-28T12:00:00Z | 2021-07-28T12:00:00Z | null | null | null | {'https://github.com/gofiber/fiber/commit/f698b5d5066cfe594102ae252cd58a1fe57cf56f', 'https://github.com/gofiber/fiber/pull/579', 'https://github.com/advisories/GHSA-9cx9-x2gp-9qvh'} | null | {'https://github.com/gofiber/fiber/commit/f698b5d5066cfe594102ae252cd58a1fe57cf56f'} | {'https://github.com/gofiber/fiber/commit/f698b5d5066cfe594102ae252cd58a1fe57cf56f'} |
Go | GHSA-m697-4v8f-55qg | Header dropping in traefik | # Impact
There exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however, the Traefik team has addressed this issue to prevent any potential abuse.
# Details
... | {'CVE-2021-32813'} | 2021-08-31T20:57:09Z | 2021-08-05T17:04:21Z | MODERATE | null | {'CWE-913'} | {'https://github.com/traefik/traefik/releases/tag/v2.4.13', 'github.com/traefik/traefik', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32813', 'https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9', 'https://github.com/traefik/traefik/security/advisories/GHSA-m697-4v8f-55qg'} | null | {'https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9'} | {'https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9'} |
Go | GHSA-88jf-7rch-32qc | Path Traversal in github.com/unknwon/cae/tz | "The ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "..". This allows an attacker to add or replace files system-wide." | {'CVE-2020-7668'} | 2022-01-04T19:33:14Z | 2021-05-18T20:31:18Z | HIGH | null | {'CWE-22'} | {'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11', 'https://github.com/unknwon/cae', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7668', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAETZ-570384'} | null | {'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'} | {'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'} |
Go | GHSA-9vp5-m38w-j776 | Aliases are never checked in helm | ### Impact
During a security audit of Helm's code base, security researchers at Trail of Bits identified a bug in which the `alias` field on a `Chart.yaml` is not properly sanitized. This could lead to the injection of unwanted information into a chart.
### Patches
This issue has been patched in Helm 3.3.2 and 2.16.... | {'CVE-2020-15184'} | 2021-11-19T15:29:12Z | 2021-05-24T16:56:58Z | LOW | null | {'CWE-20', 'CWE-74'} | {'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://github.com/helm/helm/security/advisories/GHSA-9vp5-m38w-j776', 'https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15184', 'https://github.com/helm/helm'} | null | {'https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850', 'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946'} | {'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850'} |
Go | GO-2020-0010 | null | When using ECDH-ES an attacker can mount an invalid curve attack during
decryption as the supplied public key is not checked to be on the same
curve as the recievers private key.
| {'CVE-2016-9121'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://www.openwall.com/lists/oss-security/2016/11/03/1', 'https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507'} | null | {'https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507'} | {'https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507'} |
Go | GHSA-vrmr-f2qh-3hhf | Improper use of cryptographic key in wal-g | WAL-G before 1.1, when a non-libsodium build (e.g., one of the official binary releases published as GitHub Releases) is used, silently ignores the libsodium encryption key and uploads cleartext backups. This is arguably a Principle of Least Surprise violation because "the user likely wanted to encrypt all file activit... | {'CVE-2021-38599'} | 2021-08-30T17:30:36Z | 2021-09-02T17:17:16Z | HIGH | null | {'CWE-922'} | {'https://github.com/wal-g/wal-g/pull/1062', 'https://github.com/wal-g/wal-g/commit/cadf598e1c2a345915a21a44518c5a4d5401e2e3', 'https://github.com/wal-g/wal-g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38599', 'https://github.com/wal-g/wal-g/releases/tag/v1.1'} | null | {'https://github.com/wal-g/wal-g/commit/cadf598e1c2a345915a21a44518c5a4d5401e2e3'} | {'https://github.com/wal-g/wal-g/commit/cadf598e1c2a345915a21a44518c5a4d5401e2e3'} |
Go | GHSA-5rcv-m4m3-hfh7 | Infinite Loop in Go | Go version v0.3.3 of the x/text package fixes a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite lo... | {'CVE-2020-14040'} | 2021-05-12T14:54:58Z | 2021-05-18T18:34:35Z | HIGH | null | {'CWE-400', 'CWE-835'} | {'https://go-review.googlesource.com/c/text/+/238238', 'https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14040', 'https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0', 'https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e', ... | null | {'https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e'} | {'https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e'} |
Go | GHSA-856q-xv3c-7f2f | Unauthenticated control plane denial of service attack in Istio | ### Impact
The Istio control plane, `istiod`, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012, but does not require any authentication from the attacker.
For simple... | {'CVE-2022-23635'} | 2022-02-25T15:38:52Z | 2022-02-23T14:59:08Z | HIGH | null | {'CWE-287'} | {'https://istio.io/latest/news/security/istio-security-2022-003', 'https://github.com/istio/istio/security/advisories/GHSA-856q-xv3c-7f2f', 'https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23635', 'https://github.com/istio/istio/'} | null | {'https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84'} | {'https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84'} |
Go | GO-2021-0077 | null | A user can use a valid client certificate that contains a CommonName that matches a
valid RBAC username to authenticate themselves as that user, despite lacking the
required credentials. This may allow authentication bypass, but requires a certificate
that is issued by a CA trusted by the server.
| {'CVE-2018-16886'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/etcd-io/etcd/pull/10366', 'https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2'} | null | {'https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2'} | {'https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2'} |
Go | GO-2021-0098 | null | Due to the standard library behavior of exec.LookPath on Windows a number of methods may
result in arbitary code execution when cloning or operating on untrusted Git repositories.
| {'CVE-2021-21237'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a', 'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-cx3w-xqmc-84g5'} | null | {'https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a'} | {'https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.