ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-7h43-gx24-p529
Prototype pollution in json8
This affects the package json8 before 1.0.3. The function adds in the target object the property specified in the path, however it does not properly check the key being set, leading to a prototype pollution.
{'CVE-2020-7770'}
2021-05-10T19:17:05Z
2021-05-10T19:17:05Z
CRITICAL
9.8
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-JSON8-1017116', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7770', 'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e', 'https://github.com/advisories/GHSA-7h43-gx24-p529', 'https://www.npmjs.com/package/json8'}
null
{'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e'}
{'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e'}
GHSA
GHSA-7f33-f4f5-xwgw
In-band key negotiation issue in AWS S3 Crypto SDK for golang
### Summary The golang AWS S3 Crypto SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the bucket in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when e...
{'CVE-2020-8912'}
2022-04-19T19:02:32Z
2022-02-11T23:23:13Z
LOW
2.5
{'CWE-327'}
{'https://github.com/aws/aws-sdk-go/commit/1e84382fa1c0086362b5a4b68e068d4f8518d40e', 'https://github.com/aws/aws-sdk-go/pull/3403', 'https://github.com/advisories/GHSA-7f33-f4f5-xwgw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8912', 'https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw...
null
{'https://github.com/aws/aws-sdk-go/commit/1e84382fa1c0086362b5a4b68e068d4f8518d40e', 'https://github.com/aws/aws-sdk-go/commit/ae9b9fd92af132cfd8d879809d8611825ba135f4'}
{'https://github.com/aws/aws-sdk-go/commit/1e84382fa1c0086362b5a4b68e068d4f8518d40e', 'https://github.com/aws/aws-sdk-go/commit/ae9b9fd92af132cfd8d879809d8611825ba135f4'}
GHSA
GHSA-4278-2v5v-65r4
Heap buffer overflow in `RaggedBinCount`
### Impact If the `splits` argument of `RaggedBincount` does not specify a valid [`SparseTensor`](https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow: ```python import tensorflow as tf tf.raw_ops.RaggedBincount(splits=[0], values=[1,1,1,1,1], size=5, ...
{'CVE-2021-29512'}
2021-05-21T14:20:40Z
2021-05-21T14:20:40Z
LOW
2.5
{'CWE-787', 'CWE-120'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29512', 'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4278-2v5v-65r4', 'https://github.com/advisories/GHSA-4278-2v5v-65r4'}
null
{'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'}
{'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'}
GHSA
GHSA-6cp7-g972-w9m9
Use of a Key Past its Expiration Date and Insufficient Session Expiration in Maddy Mail Server
### Impact Any configuration on any maddy version <0.5.4 using auth.pam is affected. No password expiry or account expiry checking is done when authenticating using PAM. ### Patches Patch is available as part of the 0.5.4 release. ### Workarounds If /etc/shadow authentication is used, it is possible to replace au...
{'CVE-2022-24732'}
2022-03-18T20:12:31Z
2022-03-07T16:59:31Z
MODERATE
6.3
{'CWE-324', 'CWE-613'}
{'https://github.com/advisories/GHSA-6cp7-g972-w9m9', 'https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583', 'https://github.com/foxcpp/maddy/releases/tag/v0.5.4', 'https://github.com/foxcpp/maddy/security/advisories/GHSA-6cp7-g972-w9m9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24732'}
null
{'https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583'}
{'https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583'}
GHSA
GHSA-rfw2-x9f8-2f6m
Cross-Site Scripting
LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar.
{'CVE-2021-26722'}
2021-04-30T17:27:53Z
2021-04-30T17:27:53Z
MODERATE
0
{'CWE-79'}
{'https://github.com/linkedin/oncall/issues/341', 'https://github.com/advisories/GHSA-rfw2-x9f8-2f6m', 'https://pypi.org/project/oncall/', 'https://github.com/linkedin/oncall/commit/843bc106a1c1b1699e9e52b6b0d01c7efe1d6225', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26722'}
null
{'https://github.com/linkedin/oncall/commit/843bc106a1c1b1699e9e52b6b0d01c7efe1d6225'}
{'https://github.com/linkedin/oncall/commit/843bc106a1c1b1699e9e52b6b0d01c7efe1d6225'}
GHSA
GHSA-px3r-jm9g-c8w8
Moderate severity vulnerability that affects rails-html-sanitizer
There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar ...
{'CVE-2018-3741'}
2021-01-08T18:19:13Z
2018-04-26T15:41:10Z
MODERATE
0
{'CWE-79'}
{'https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3741', 'https://github.com/advisories/GHSA-px3r-jm9g-c8w8'}
null
{'https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae'}
{'https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae'}
GHSA
GHSA-m296-j53x-xv95
Data races in tiny_future
`tiny_future` contains a light-weight implementation of `Future`s. The `Future` type it has lacked bound on its `Send` and `Sync` traits. This allows for a bug where non-thread safe types such as `Cell` can be used in `Future`s and cause data races in concurrent programs. The flaw was corrected in commit `c791919` by...
null
2021-08-25T21:00:32Z
2021-08-25T21:00:32Z
MODERATE
0
{'CWE-362'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0118.html', 'https://github.com/KizzyCode/tiny_future/commit/7ab8a264980d23c2ed64e72f4636f38b7381eb39', 'https://github.com/KizzyCode/tiny_future/commit/c7919199a0f6d1ce0e3c33499d1b37f862c990e4', 'https://github.com/KizzyCode/tiny_future/issues/1', 'https://github.com/advis...
null
{'https://github.com/KizzyCode/tiny_future/commit/c7919199a0f6d1ce0e3c33499d1b37f862c990e4', 'https://github.com/KizzyCode/tiny_future/commit/7ab8a264980d23c2ed64e72f4636f38b7381eb39'}
{'https://github.com/KizzyCode/tiny_future/commit/c7919199a0f6d1ce0e3c33499d1b37f862c990e4', 'https://github.com/KizzyCode/tiny_future/commit/7ab8a264980d23c2ed64e72f4636f38b7381eb39'}
GHSA
GHSA-crjr-9rc5-ghw8
Inefficient Regular Expression Complexity in Nokogiri
## Summary Nokogiri `< v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. ## Mitigation Upgrade to Nokogiri `>= 1.13.4`. ## Severity The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.1...
{'CVE-2022-24836'}
2022-04-26T18:00:11Z
2022-04-11T21:18:06Z
HIGH
7.5
{'CWE-400', 'CWE-1333'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24836', 'https://github.com/advisories/GHSA-crjr-9rc5-ghw8', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDCWR...
null
{'https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd'}
{'https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd'}
GHSA
GHSA-f4cj-3q3h-884r
Partial authorization bypass on document save in xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with SCRIPT right (EDIT right before XWiki 7.4) can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. It has...
{'CVE-2022-23615'}
2022-05-05T18:01:30Z
2022-02-09T21:21:53Z
MODERATE
5.4
{'CWE-863'}
{'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe', 'https://github.com/advisories/GHSA-f4cj-3q3h-884r', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23615', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f4cj-3q3h-884r', 'https://jira.xwiki.org/browse/XWIKI-5024...
null
{'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe'}
{'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe'}
GHSA
GHSA-6x77-rpqf-j6mw
High severity vulnerability that affects ejs
nodejs ejs version older than 2.5.5 is vulnerable to a denial-of-service due to weak input validation in the ejs.renderFile()
{'CVE-2017-1000189'}
2021-09-02T19:10:59Z
2018-03-05T18:54:33Z
HIGH
7.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000189', 'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f', 'http://www.securityfocus.com/bid/101893', 'https://github.com/advisories/GHSA-6x77-rpqf-j6mw'}
null
{'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'}
{'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'}
GHSA
GHSA-8h4j-vm3r-vcq3
Use after free in rusqlite
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via an Auxdata API use-after-free.
{'CVE-2020-35870'}
2021-08-25T20:47:48Z
2021-08-25T20:47:48Z
CRITICAL
9.8
{'CWE-416'}
{'https://github.com/rusqlite/rusqlite/commit/2ef3628dac35aeba0a97d5fb3a57746b4e1d62b3', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://github.com/advisories/GHSA-8h4j-vm3r-vcq3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35870'}
null
{'https://github.com/rusqlite/rusqlite/commit/2ef3628dac35aeba0a97d5fb3a57746b4e1d62b3'}
{'https://github.com/rusqlite/rusqlite/commit/2ef3628dac35aeba0a97d5fb3a57746b4e1d62b3'}
GHSA
GHSA-gq4h-f254-7cw9
Data races in ticketed_lock
Affected versions of this crate unconditionally implemented `Send` for `ReadTicket<T>` & `WriteTicket<T>`. This allows to send non-Send `T` to other threads. This can allows creating data races by cloning types with internal mutability and sending them to other threads (as `T` of `ReadTicket<T>`/`WriteTicket<T>`). Suc...
null
2021-08-25T21:00:34Z
2021-08-25T21:00:34Z
MODERATE
0
{'CWE-362'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0119.html', 'https://github.com/kvark/ticketed_lock/issues/7', 'https://github.com/kvark/ticketed_lock/pull/8/commits/a986a9335d591fa5c826157d1674d47aa525357f', 'https://github.com/advisories/GHSA-gq4h-f254-7cw9'}
null
{'https://github.com/kvark/ticketed_lock/pull/8/commits/a986a9335d591fa5c826157d1674d47aa525357f'}
{'https://github.com/kvark/ticketed_lock/pull/8/commits/a986a9335d591fa5c826157d1674d47aa525357f'}
GHSA
GHSA-jjv7-qpx3-h62q
Denial-of-Service Memory Exhaustion in qs
Versions prior to 1.0 of `qs` are affected by a denial of service condition. This condition is triggered by parsing a crafted string that deserializes into very large sparse arrays, resulting in the process running out of memory and eventually crashing. ## Recommendation Update to version 1.0.0 or later.
{'CVE-2014-7191'}
2021-09-14T19:46:49Z
2017-10-24T18:33:36Z
HIGH
0
null
{'https://github.com/advisories/GHSA-jjv7-qpx3-h62q', 'https://github.com/visionmedia/node-querystring/issues/104', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96729', 'https://access.redhat.com/errata/RHSA-2016:1380', 'http://www-01.ibm.com/support/docview.wss?uid=swg21687263', 'http://secunia.com/advisories...
null
{'https://github.com/raymondfeng/node-querystring/commit/43a604b7847e56bba49d0ce3e222fe89569354d8'}
{'https://github.com/raymondfeng/node-querystring/commit/43a604b7847e56bba49d0ce3e222fe89569354d8'}
GHSA
GHSA-gwpf-62xp-vrg6
Information Exposure in cordova-android
Versions of `cordova-android` prior to 6.0.0 are vulnerable to Information Exposure through log files. The application calls methods of the Log class. Messages passed to these methods (Log.v(), Log.d(), Log.i(), Log.w(), and Log.e()) are stored in a series of circular buffers on the device. By default, a maximum of fou...
{'CVE-2016-6799'}
2021-09-28T16:53:05Z
2020-09-11T21:14:49Z
HIGH
7.5
{'CWE-532'}
{'http://www.securityfocus.com/bid/98365', 'https://snyk.io/vuln/SNYK-JS-CORDOVAANDROID-174935', 'https://github.com/apache/cordova-android/commit/4a0a7bc424fae14c9689f4a8a2dc250ae3a47f82', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6799', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6799', 'https://github....
null
{'https://github.com/apache/cordova-android/commit/4a0a7bc424fae14c9689f4a8a2dc250ae3a47f82'}
{'https://github.com/apache/cordova-android/commit/4a0a7bc424fae14c9689f4a8a2dc250ae3a47f82'}
GHSA
GHSA-gg84-qgv9-w4pq
CRLF injection in httplib2
### Impact Attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. Impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. ### Patches P...
{'CVE-2020-11078'}
2022-04-19T19:02:26Z
2020-05-20T15:55:47Z
LOW
6.8
{'CWE-93'}
{'https://lists.debian.org/debian-lts-announce/2020/06/msg00000.html', 'https://lists.apache.org/thread.html/rad8872fc99f670958c2774e2bf84ee32a3a0562a0c787465cf3dfa23@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r23711190c2e98152cb6f216b95090d5eeb978543bb7e0bad22ce47fc@%3Cissues.beam.apache.org%...
null
{'https://github.com/httplib2/httplib2/commit/a1457cc31f3206cf691d11d2bf34e98865873e9e'}
{'https://github.com/httplib2/httplib2/commit/a1457cc31f3206cf691d11d2bf34e98865873e9e'}
GHSA
GHSA-8fxw-76px-3rxv
Memory leak in Tensorflow
### Impact If a user passes a list of strings to `dlpack.to_dlpack` there is a memory leak following an expected validation failure: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L100-L104 The allocated memory is from https://github.com/tensorflow/t...
{'CVE-2020-15192'}
2021-08-26T15:09:35Z
2020-09-25T18:28:17Z
MODERATE
4.3
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15192', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fxw-76px-3rxv', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-8fxw-76px-3rxv', 'https://github.com/tensorflow/tensorflow/commit/22e0...
null
{'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'}
{'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'}
GHSA
GHSA-3c9c-2p65-qvwv
Prototype pollution in aurelia-path
### Impact The vulnerability exposes Aurelia application that uses `aurelia-path` package to parse a string. The majority of this will be Aurelia applications that employ the `aurelia-router` package. An example is this could allow an attacker to change the prototype of base object class `Object` by tricking an applica...
{'CVE-2021-41097'}
2022-04-19T19:03:10Z
2021-09-27T20:12:16Z
HIGH
9.1
{'CWE-1321', 'CWE-915'}
{'https://github.com/aurelia/path/commit/7c4e235433a4a2df9acc313fbe891758084fdec1', 'https://www.npmjs.com/package/aurelia-path', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41097', 'https://github.com/advisories/GHSA-3c9c-2p65-qvwv', 'https://github.com/aurelia/path/security/advisories/GHSA-3c9c-2p65-qvwv', 'https://gi...
null
{'https://github.com/aurelia/path/commit/7c4e235433a4a2df9acc313fbe891758084fdec1'}
{'https://github.com/aurelia/path/commit/7c4e235433a4a2df9acc313fbe891758084fdec1'}
GHSA
GHSA-36m2-8rhx-f36j
Sandbox bypass in Latte templates
### Impact The problem affects users who use the sandbox in Latte and templates from untrusted sources. ### Patches Sandbox first appeared in Latte 2.8.0. The issue is fixed in the versions 2.8.8, 2.9.6 and 2.10.8. ### References The issues were discovered by - JinYiTong (https://github.com/JinYiTong) - 赵钰迪 <2021201...
{'CVE-2022-21648'}
2022-04-19T19:03:19Z
2022-01-06T23:17:07Z
HIGH
8.2
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21648', 'https://github.com/advisories/GHSA-36m2-8rhx-f36j', 'https://github.com/nette/latte/security/advisories/GHSA-36m2-8rhx-f36j', 'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0'}
null
{'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0'}
{'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0'}
GHSA
GHSA-66q9-f7ff-mmx6
Local file inclusion vulnerability in http4s
### Impact This vulnerability applies to all users of: * `org.http4s.server.staticcontent.FileService` * `org.http4s.server.staticcontent.ResourceService` * `org.http4s.server.staticcontent.WebjarService` #### Path escaping URI normalization is applied incorrectly. Requests whose path info contain `../` or `//` can...
{'CVE-2020-5280'}
2021-01-14T17:48:19Z
2020-03-25T17:35:51Z
CRITICAL
7.6
{'CWE-23'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5280', 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca', 'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec', 'https://github.com/advisories/GHSA-66q9-f7ff-mmx6', 'https://github.com/http4s/http4s/security/advis...
null
{'https://github.com/http4s/http4s/commit/b87f31b2292dabe667bec3b04ce66176c8a3e17b', 'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec', 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca'}
{'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec', 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca', 'https://github.com/http4s/http4s/commit/b87f31b2292dabe667bec3b04ce66176c8a3e17b'}
GHSA
GHSA-47wr-426j-fr82
Symbolic links in an unpacking routine may enable attackers to read and/or write to arbitrary locations in dbdeployer
### Impact _Users unpacking a tarball through dbdeployer may use a maliciously packaged tarball that contains symlinks to files external to the target. In such scenario, an attacker could induce dbdeployer to write into a system file, thus altering the computer defences._ ### Mitigating factors For the attach to succe...
{'CVE-2020-26277'}
2022-04-19T19:02:43Z
2022-02-12T00:14:07Z
MODERATE
6.1
{'CWE-59'}
{'https://github.com/datacharmer/dbdeployer/security/advisories/GHSA-47wr-426j-fr82', 'https://github.com/advisories/GHSA-47wr-426j-fr82', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26277', 'https://github.com/datacharmer/dbdeployer/commit/548e256c1de2f99746e861454e7714ec6bc9bb10'}
null
{'https://github.com/datacharmer/dbdeployer/commit/548e256c1de2f99746e861454e7714ec6bc9bb10'}
{'https://github.com/datacharmer/dbdeployer/commit/548e256c1de2f99746e861454e7714ec6bc9bb10'}
GHSA
GHSA-pxpf-v376-7xx5
tagify can pass a malicious placeholder to initiate the cross-site scripting (XSS) payload
This affects the package @yaireo/tagify before 4.9.8. The package is used for rendering UI components inside the input or text fields, and an attacker can pass a malicious placeholder value to it to fire the cross-site scripting (XSS) payload.
{'CVE-2022-25854'}
2022-05-03T04:55:33Z
2022-04-30T00:00:33Z
MODERATE
0
null
{'https://github.com/yairEO/tagify/issues/988', 'https://snyk.io/vuln/SNYK-JS-YAIREOTAGIFY-2404358', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25854', 'https://github.com/yairEO/tagify/commit/198c0451fad188390390395ccfc84ab371def4c7', 'https://github.com/yairEO/tagify/releases/tag/v4.9.8', 'https://github.com/advisori...
null
{'https://github.com/yairEO/tagify/commit/198c0451fad188390390395ccfc84ab371def4c7'}
{'https://github.com/yairEO/tagify/commit/198c0451fad188390390395ccfc84ab371def4c7'}
GHSA
GHSA-7gcp-w6ww-2xv9
Path traversal and files overwrite with unsquashfs in singularity
### Impact Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs` (a distribution provided utility used by Singularity), it is possible to overwrite/create any files on the host filesystem during the extraction of a crafted squashfs filesystem. Squashfs extraction occurs auto...
{'CVE-2020-15229'}
2022-04-19T19:02:36Z
2021-05-24T16:59:53Z
HIGH
8.2
{'CWE-22'}
{'https://github.com/hpcng/singularity/blob/v3.6.4/CHANGELOG.md#security-related-fixes', 'https://github.com/hpcng/singularity/pull/5611', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15229', 'https://github.com/hpcng/singularity/security/advis...
null
{'https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e'}
{'https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e'}
GHSA
GHSA-cjvr-mfj7-j4j8
Incorrect Authorization and Exposure of Sensitive Information to an Unauthorized Actor in scrapy
### Impact If you manually define cookies on a [`Request`](https://docs.scrapy.org/en/latest/topics/request-response.html#scrapy.http.Request) object, and that `Request` object gets a redirect response, the new `Request` object scheduled to follow the redirect keeps those user-defined cookies, regardless of the target...
{'CVE-2022-0577'}
2022-04-05T18:51:14Z
2022-03-01T22:12:47Z
MODERATE
6.5
{'CWE-200', 'CWE-863'}
{'https://github.com/advisories/GHSA-cjvr-mfj7-j4j8', 'https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html', 'https://github.com/scrapy/scrapy/security/advisories/GHSA-cjvr-mfj7-j4j8', 'https://nvd.nist.gov/vuln/detail/CV...
null
{'https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a'}
{'https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a'}
GHSA
GHSA-92vm-mxjf-jqf3
Improper Verification of Cryptographic Signature in starkbank-ecdsa
The `verify` function in the Stark Bank Python ECDSA library (starkbank-ecdsa) 2.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.
{'CVE-2021-43572'}
2022-03-29T22:08:01Z
2021-11-10T20:41:39Z
CRITICAL
9.8
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43572', 'https://github.com/starkbank/ecdsa-python/commit/d136170666e9510eb63c2572551805807bd4c17f', 'https://github.com/advisories/GHSA-92vm-mxjf-jqf3', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', ...
null
{'https://github.com/starkbank/ecdsa-python/commit/d136170666e9510eb63c2572551805807bd4c17f'}
{'https://github.com/starkbank/ecdsa-python/commit/d136170666e9510eb63c2572551805807bd4c17f'}
GHSA
GHSA-vm67-7vmg-66vm
Arbitrary Command Injection in portprocesses
### Impact An Arbitrary Command Injection vulnerability was reported in `portprocesses` impacting versions <= 1.0.4. ### Example (Proof of Concept) The following example demonstrates the vulnerability and will run `touch success` therefore creating a file named `success`. ```js const portprocesses = require("portpr...
{'CVE-2021-23348'}
2022-04-19T19:02:49Z
2021-04-06T17:24:50Z
MODERATE
6.4
{'CWE-77', 'CWE-78'}
{'https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23348', 'https://github.com/rrainn/PortProcesses/blob/fffceb09aff7180afbd0bd172e820404b33c8299/index.js%23L23', 'https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7a...
null
{'https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7aa4214e1'}
{'https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7aa4214e1'}
GHSA
GHSA-6635-c626-vj4r
Command Injection Vulnerability with Mercurial in VCS
URLs and local file paths passed to the Mercurial (hg) APIs that are specially crafted can contain commands which are executed by Mercurial if it is installed on the host operating system. The `vcs` package uses the underly version control system, in this case `hg`, to implement the needed functionality. When `hg` is e...
{'CVE-2022-21235'}
2022-04-18T21:47:33Z
2022-04-01T14:05:33Z
CRITICAL
9.8
{'CWE-88', 'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21235', 'https://github.com/Masterminds/vcs/commit/922a5122330ea8fbe56352a0172ddb6bf019cd22', 'https://github.com/advisories/GHSA-6635-c626-vj4r', 'https://github.com/Masterminds/vcs/security/advisories/GHSA-6635-c626-vj4r', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMI...
null
{'https://github.com/Masterminds/vcs/commit/922a5122330ea8fbe56352a0172ddb6bf019cd22'}
{'https://github.com/Masterminds/vcs/commit/922a5122330ea8fbe56352a0172ddb6bf019cd22'}
GHSA
GHSA-q42q-523g-3fwv
Cross-Site Request Forgery
This affects the package com.softwaremill.akka-http-session:core_2.13 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.12 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.11 before 0.5.11. For older versions, endpoints protected by randomTokenCsrfProtection could be bypassed with...
{'CVE-2020-7780'}
2022-02-09T23:06:40Z
2022-02-09T23:06:40Z
MODERATE
8.8
{'CWE-352'}
{'https://github.com/softwaremill/akka-http-session/issues/77', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7780', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1045352', 'https://github.com/advisories/GHSA-q42q-523g-3fwv', 'https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d...
null
{'https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d164f655b9c5f953b41'}
{'https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d164f655b9c5f953b41'}
GHSA
GHSA-pwqf-9h7j-7mv8
Incorrect threshold signature computation in TUF
### Impact Metadadata signature verification, as used in `tuf.client.updater`, counted each of multiple signatures with identical authorized keyids separately towards the threshold. Therefore, an attacker with access to a valid signing key could create multiple valid signatures in order to meet the minimum threshold o...
{'CVE-2020-6174'}
2022-03-23T23:02:07Z
2020-08-21T16:25:26Z
CRITICAL
9.8
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-6174', 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-pwqf-9h7j-7mv8', 'https://github.com/theupdateframework/tuf/pull/974/commits/a0397c7c820ec1c30ebc793cc9469b61c8d3f50e', 'https://github.com/advisories/GHSA-pwqf-9h7j-7mv8', 'https://github.com/theupdat...
null
{'https://github.com/theupdateframework/tuf/pull/974/commits/a0397c7c820ec1c30ebc793cc9469b61c8d3f50e'}
{'https://github.com/theupdateframework/tuf/pull/974/commits/a0397c7c820ec1c30ebc793cc9469b61c8d3f50e'}
GHSA
GHSA-23r4-5mxp-c7g5
New anonymous user session acts as if it's created with password
### Impact Developers that use the REST API to signup users and also allow users to login anonymously. When an anonymous user is first signed up using REST, the server creates session incorrectly, particularly the `authProvider` field in `_Session` class under `createdWith` shows the user logged in creating a password...
{'CVE-2021-39138'}
2022-04-19T19:02:51Z
2021-08-23T19:41:52Z
MODERATE
4.8
{'CWE-287'}
{'https://github.com/parse-community/parse-server/security/advisories/GHSA-23r4-5mxp-c7g5', 'https://github.com/parse-community/parse-server/releases/tag/4.5.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39138', 'https://github.com/parse-community/parse-server/commit/147bd9a3dc43391e92c36e05d5db860b04ca27db', 'https:/...
null
{'https://github.com/parse-community/parse-server/commit/147bd9a3dc43391e92c36e05d5db860b04ca27db'}
{'https://github.com/parse-community/parse-server/commit/147bd9a3dc43391e92c36e05d5db860b04ca27db'}
GHSA
GHSA-wc73-w5r9-x9pc
Cross-site Scripting in XXL-JOB
XXL-JOB 2.2.0 allows Stored XSS (in Add User) to bypass the 20-character limit via xxl-job-admin/src/main/java/com/xxl/job/admin/controller/UserController.java.
{'CVE-2020-29204'}
2021-10-12T16:41:36Z
2021-10-12T16:41:36Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-29204', 'https://github.com/advisories/GHSA-wc73-w5r9-x9pc', 'https://github.com/xuxueli/xxl-job/issues/2083', 'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'}
null
{'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'}
{'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'}
GHSA
GHSA-4fr2-j4g9-mppf
Improperly Controlled Modification of Dynamically-Determined Object Attributes in deephas
Prototype pollution vulnerability in 'deephas' versions 1.0.0 through 1.0.5 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28271'}
2021-09-24T15:42:21Z
2021-09-24T15:42:21Z
CRITICAL
9.8
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28271', 'https://github.com/sharpred/deepHas/commit/2fe011713a6178c50f7deb6f039a8e5435981e20', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28271,', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28271', 'https://github.com/adviso...
null
{'https://github.com/sharpred/deepHas/commit/2fe011713a6178c50f7deb6f039a8e5435981e20'}
{'https://github.com/sharpred/deepHas/commit/2fe011713a6178c50f7deb6f039a8e5435981e20'}
GHSA
GHSA-fpv6-f8jw-rc3r
Remote code execution via the web UI backend
### Impact Elvish's backend for the experimental web UI (started by `elvish -web`) hosts an endpoint that allows executing the code sent from the web UI. The backend does not check the origin of requests correctly. As a result, if the user has the web UI backend open and visits a compromised or malicious website, the...
{'CVE-2021-41088'}
2022-04-19T19:03:09Z
2021-09-23T23:17:33Z
MODERATE
8
{'CWE-668'}
{'https://github.com/advisories/GHSA-fpv6-f8jw-rc3r', 'https://github.com/elves/elvish/security/advisories/GHSA-fpv6-f8jw-rc3r', 'https://github.com/elves/elvish/commit/ccc2750037bbbfafe9c1b7a78eadd3bd16e81fe5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41088'}
null
{'https://github.com/elves/elvish/commit/ccc2750037bbbfafe9c1b7a78eadd3bd16e81fe5'}
{'https://github.com/elves/elvish/commit/ccc2750037bbbfafe9c1b7a78eadd3bd16e81fe5'}
GHSA
GHSA-p24j-h477-76q3
Uncontrolled Search Path Element in sharkdp/bat
bat on windows before 0.18.2 executes programs named less.exe from the current working directory. This can lead to unintended code execution.
{'CVE-2021-36753'}
2021-09-09T16:57:53Z
2021-08-25T21:01:37Z
HIGH
7.8
{'CWE-427'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36753', 'https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956', 'https://github.com/sharkdp/bat/releases/tag/v0.18.2', 'https://github.com/sharkdp/bat/pull/1724', 'https://github.com/advisories/GHSA-p24j-h477-76q3', 'https://vuln.ryotak.me/advisories...
null
{'https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956'}
{'https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956'}
GHSA
GHSA-3r8j-pmch-5j2h
Internal exception message exposure for login action in Sylius
## Internal exception message exposure for login action ### Impact Exception messages from internal exceptions (like database exception) are wrapped by `\Symfony\Component\Security\Core\Exception\AuthenticationServiceException` and propagated through the system to UI. Therefore, some internal system information may le...
{'CVE-2019-16768'}
2021-01-08T21:20:33Z
2019-12-05T19:57:04Z
LOW
3.5
{'CWE-209'}
{'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-3r8j-pmch-5j2h', 'https://github.com/advisories/GHSA-3r8j-pmch-5j2h', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16768'}
null
{'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f'}
{'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f'}
GHSA
GHSA-4w2v-q235-vp99
Server-Side Request Forgery in Axios
Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.
{'CVE-2020-28168'}
2021-01-29T20:58:12Z
2021-01-04T20:59:40Z
HIGH
0
{'CWE-918'}
{'https://www.npmjs.com/package/axios', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28168', 'https://www.npmjs.com/advisories/1594', 'https://snyk.io/vuln/SNYK-JS-AXIOS-1038255', 'https://github.com/axios/axios/commit/c7329fefc890050edd51e40e469a154d0117fc55', 'https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9...
null
{'https://github.com/axios/axios/commit/c7329fefc890050edd51e40e469a154d0117fc55'}
{'https://github.com/axios/axios/commit/c7329fefc890050edd51e40e469a154d0117fc55'}
GHSA
GHSA-gwcx-jrx4-92w2
Segfault in `simplifyBroadcast` in Tensorflow
### Impact The [`simplifyBroadcast` function in the MLIR-TFRT infrastructure in TensorFlow](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/mlir/tfrt/jit/transforms/tf_cpurt_symbolic_shape_optimization.cc#L149-L205) is vulnerable to a segfault (hence, denial of...
{'CVE-2022-23593'}
2022-03-28T19:30:27Z
2022-02-09T23:32:08Z
HIGH
5.9
{'CWE-754'}
{'https://github.com/advisories/GHSA-gwcx-jrx4-92w2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23593', 'https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gwcx-jrx4-92w2', 'https://github.com/tensorflow/tensorfl...
null
{'https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a'}
{'https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a'}
GHSA
GHSA-jcxv-2j3h-mg59
Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV
OpenCV 3.3.1 (corresponding with opencv-python and opencv-contrib-python 3.3.1.11) has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used.
{'CVE-2017-17760'}
2021-11-18T15:31:01Z
2021-10-12T22:03:09Z
MODERATE
6.5
{'CWE-119'}
{'https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html', 'https://github.com/advisories/GHSA-jcxv-2j3h-mg59', 'https://github.com/opencv/opencv/pull/10369/commits/7bbe1a53cfc097b82b1589f7915a2120de39274c', 'http://www.securityfocus.com/bid/102974', 'https://lists.debian.org/debian-lts-announce/2021/10/msg...
null
{'https://github.com/opencv/opencv/pull/10369/commits/7bbe1a53cfc097b82b1589f7915a2120de39274c'}
{'https://github.com/opencv/opencv/pull/10369/commits/7bbe1a53cfc097b82b1589f7915a2120de39274c'}
GHSA
GHSA-6w9p-88qg-p3g3
Cross-site Scripting in CKAN
In CKAN, versions 2.9.0 to 2.9.3 are affected by a stored XSS vulnerability via SVG file upload of users’ profile picture. This allows low privileged application users to store malicious scripts in their profile picture. These scripts are executed in a victim’s browser when they open the malicious profile picture
{'CVE-2021-25967'}
2021-12-03T20:44:48Z
2021-12-03T20:44:48Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/ckan/ckan/commit/5a46989c0a4f2c2873ca182c196da83b82babd25', 'https://github.com/ckan/ckan/pull/6477', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25967', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25967', 'https://github.com/advisories/GHSA-6w9p-88qg-p3g3'}
null
{'https://github.com/ckan/ckan/commit/5a46989c0a4f2c2873ca182c196da83b82babd25'}
{'https://github.com/ckan/ckan/commit/5a46989c0a4f2c2873ca182c196da83b82babd25'}
GHSA
GHSA-x4r7-m2q9-69c8
GraphiQL introspection schema template injection attack
- [1. Impact](#11-impact) - [2. Scope](#12-scope) - [3. Patches](#13-patches) - [3.1 CDN bundle implementations may be automatically patched](#131-cdn-bundle-implementations-may-be-automatically-patched) - [4. Workarounds for Older Versions](#14-workarounds-for-older-versions) - [5. How to Re-create the E...
{'CVE-2021-41248'}
2022-04-19T19:03:03Z
2021-11-08T18:03:50Z
HIGH
7.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41248', 'https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability', 'https://github.com/graphql/graphiql/commit/cb237eeeaf7333c4954c752122261db7520f7bf4', 'https://github.com/advisories/GHSA-x4r7-m2q9-69c...
null
{'https://github.com/graphql/graphiql/commit/cb237eeeaf7333c4954c752122261db7520f7bf4', 'https://github.com/graphql/graphiql/commit/6701b0b626e43800e32413590a295e5c1e3d5419#diff-d45eb76aebcffd27d3a123214487116fa95e0b5a11d70a94a0ce3033ce09f879R110', 'https://github.com/graphql/graphiql/commit/b9dec272d89d9c590727fd10d62...
{'https://github.com/graphql/graphiql/commit/b9dec272d89d9c590727fd10d62e4a47e0317fc7#diff-855b77f6310b7e4fb1bcac779cd945092ed49fd759f4684ea391b45101166437R87', 'https://github.com/graphql/graphiql/commit/cb237eeeaf7333c4954c752122261db7520f7bf4', 'https://github.com/graphql/graphiql/commit/6701b0b626e43800e32413590a29...
GHSA
GHSA-qc53-44cj-vfvx
Denial of Service in Tensorflow
### Impact The `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has rank 2. This tensor must be a matrix because code assumes its elements are accessed as elements of a matrix: https://github.c...
{'CVE-2020-15197'}
2021-08-26T15:12:10Z
2020-09-25T18:28:30Z
MODERATE
6.3
{'CWE-20', 'CWE-617'}
{'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qc53-44cj-vfvx', 'https://github.com/advisories/GHSA-qc53-44cj-vfvx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15197', 'https://github.com/tensorflow/tensorfl...
null
{'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}
{'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}
GHSA
GHSA-cwp9-956f-vcwh
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1141'}
2021-03-29T20:57:56Z
2021-03-29T20:57:56Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1141', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1141', 'https://github.com/advisories/GHSA-cwp9-956f-vcwh', 'https://github.com/chakra-core/ChakraC...
null
{'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
{'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
GHSA
GHSA-5mg8-w23w-74h3
Information Disclosure in Guava
A temp directory creation vulnerability exists in all Guava versions allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava `com.google.common.io.Files.createTempDir()`. The permissions granted to the directory created default to the standard unix-like /...
{'CVE-2020-8908'}
2022-04-26T20:59:22Z
2021-03-25T17:04:19Z
LOW
3.3
{'CWE-200', 'CWE-173', 'CWE-732'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8908', 'https://lists.apache.org/thread.html/reebbd63c25bc1a946caa419cec2be78079f8449d1af48e52d47c9e85@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r6874dfe26eefc41b7c9a5e4a0487846fc4accf8c78ff948b24a1104a@%3Cdev.drill.apache.org%3E', 'https://lists.a...
null
{'https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40'}
{'https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40'}
GHSA
GHSA-x8wj-cqmp-3wmm
Cross-site Scripting in Zenario CMS
Zenario CMS 9.0.54156 is vulnerable to Cross Site Scripting (XSS) via upload file to *.SVG. An attacker can send malicious files to victims and steals victim's cookie leads to account takeover. The person viewing the image of a contact can be victim of XSS.
{'CVE-2021-41952'}
2022-03-29T21:14:28Z
2022-03-15T00:00:59Z
MODERATE
4.8
{'CWE-79'}
{'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007', 'https://github.com/TribalSystems/Zenario/releases/tag/9.0.55141', 'https://github.com/advisories/GHSA-x8wj-cqmp-3wmm', 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/1', 'https://nvd.nist.gov/vuln/detail/CV...
null
{'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'}
{'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'}
GHSA
GHSA-37pf-w9ff-gqvm
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20...
{'CVE-2019-0927'}
2021-03-29T20:58:59Z
2021-03-29T20:58:59Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0927', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0927', 'https://github.com/advisories/GHSA-37pf-w9ff-gqvm', 'https://github.com/chakra-core/ChakraC...
null
{'https://github.com/chakra-core/ChakraCore/commit/87ac2b5a751710ee288fdda3fd4d9818e22387a1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/87ac2b5a751710ee288fdda3fd4d9818e22387a1'}
GHSA
GHSA-h4mf-75hf-67w4
Information disclosure in parse-server
1. you can fetch all the users' objects, by using regex in the NoSQL query. Using the NoSQL, you can use a regex on sessionToken `("_SessionToken":{"$regex":"r:027f"}}` and find valid accounts this way. Using this method, it's possible to retrieve accounts without interaction from the users. GET /parse/users/me HTTP/...
{'CVE-2020-5251'}
2022-04-19T19:02:41Z
2020-03-04T20:20:27Z
HIGH
7.7
{'CWE-200', 'CWE-285'}
{'https://github.com/parse-community/parse-server/commit/3a3a5eee5ffa48da1352423312cb767de14de269', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-h4mf-75hf-67w4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5251', 'https://github.com/advisories/GHSA-h4mf-75hf-67w4'}
null
{'https://github.com/parse-community/parse-server/commit/3a3a5eee5ffa48da1352423312cb767de14de269'}
{'https://github.com/parse-community/parse-server/commit/3a3a5eee5ffa48da1352423312cb767de14de269'}
GHSA
GHSA-mvqp-q37c-wf9j
Moderate severity vulnerability that affects io.ratpack:ratpack-core
## CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') Versions of Ratpack 0.9.1 through and including 1.7.4 are vulnerable to [HTTP Response Splitting](https://www.owasp.org/index.php/HTTP_Response_Splitting), if untrusted and unsanitized data is used to populate the header...
{'CVE-2019-17513'}
2021-09-15T21:01:30Z
2019-10-21T16:08:43Z
HIGH
7.5
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-17513', 'https://github.com/ratpack/ratpack/releases/tag/v1.7.5', 'https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d', 'https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae', 'https://ratpack.io/versions/1.7.5', '...
null
{'https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d', 'https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae'}
{'https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae', 'https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d'}
GHSA
GHSA-7gc6-qh9x-w6h8
Incorrect Authorization in cross-fetch
When fetching a remote url with Cookie if it get Location response header then it will follow that url and try to fetch that url with provided cookie . So cookie is leaked here to thirdparty. Ex: you try to fetch example.com with cookie and if it get redirect url to attacker.com then it fetch that redirect url with pro...
{'CVE-2022-1365'}
2022-05-03T17:48:17Z
2022-04-17T00:00:32Z
MODERATE
6.1
{'CWE-863', 'CWE-359'}
{'https://github.com/lquixada/cross-fetch/pull/135', 'https://huntr.dev/bounties/ab55dfdd-2a60-437a-a832-e3efe3d264ac', 'https://github.com/lquixada/cross-fetch/commit/a3b3a9481091ddd06b8f83784ba9c4e034dc912a', 'https://github.com/advisories/GHSA-7gc6-qh9x-w6h8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1365'}
null
{'https://github.com/lquixada/cross-fetch/commit/a3b3a9481091ddd06b8f83784ba9c4e034dc912a'}
{'https://github.com/lquixada/cross-fetch/commit/a3b3a9481091ddd06b8f83784ba9c4e034dc912a'}
GHSA
GHSA-x27w-qxhg-343v
Access Restriction Bypass in go-ldap
In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go, an attacker may be able to login with an empty password. This issue affects an application using this package if these conditions are met: (1) it relies only on the return error of the Bind function call to determine whether a user is authorized (i.e., a nil re...
{'CVE-2017-14623'}
2022-04-12T22:32:59Z
2022-02-15T01:57:18Z
HIGH
8.1
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-14623', 'https://github.com/go-ldap/ldap/pull/126', 'https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66', 'https://github.com/advisories/GHSA-x27w-qxhg-343v'}
null
{'https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66'}
{'https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66'}
GHSA
GHSA-545q-3fg6-48m7
Regular expression denial of service (ReDoS)
This affects the package html-parse-stringify before 2.0.1; all versions of package html-parse-stringify2. Sending certain input could cause one of the regular expressions that is used for parsing to backtrack, freezing the process.
{'CVE-2021-23346'}
2021-03-18T19:39:32Z
2021-03-18T19:39:31Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/advisories/GHSA-545q-3fg6-48m7', 'https://github.com/HenrikJoreteg/html-parse-stringify/releases/tag/v2.0.1', 'https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306', 'https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307', 'https://github.com/rayd/html-parse-stringify2/blob/master/lib/parse.j...
null
{'https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12'}
{'https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12'}
GHSA
GHSA-g2qj-pmxm-9f8f
User enumeration in authentication mechanisms
Description ----------- The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authent...
null
2021-10-08T21:21:13Z
2021-05-17T20:52:32Z
LOW
0
{'CWE-200'}
{'https://github.com/symfony/symfony/security/advisories/GHSA-g2qj-pmxm-9f8f', 'https://github.com/advisories/GHSA-g2qj-pmxm-9f8f', 'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'}
null
{'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'}
{'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'}
GHSA
GHSA-9qq2-xhmc-h9qr
Access Control Bypass
An issue was discovered in Rancher 2 through 2.1.5. Any project member with access to the default namespace can mount the netes-default service account in a pod, and then use that pod to execute administrative privileged commands against the k8s cluster. This could be mitigated by isolating the default namespace in a s...
{'CVE-2018-20321'}
2022-04-25T20:21:12Z
2021-06-23T17:57:10Z
MODERATE
4.2
{'CWE-288', 'CWE-668'}
{'https://rancher.com/blog/2019/2019-01-29-explaining-security-vulnerabilities-addressed-in-rancher-v2-1-6-and-v2-0-11/', 'https://github.com/rancher/rancher/commit/6ea187fcc2309d5a7a14ed47de5688bf6573f448', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20321', 'https://github.com/rancher/rancher/releases/tag/v2.1.6', 'ht...
null
{'https://github.com/rancher/rancher/commit/6ea187fcc2309d5a7a14ed47de5688bf6573f448'}
{'https://github.com/rancher/rancher/commit/6ea187fcc2309d5a7a14ed47de5688bf6573f448'}
GHSA
GHSA-68q3-7wjp-7q3j
The filename of uploaded files vulnerable to stored XSS
### Impact The filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it. Additionally, the measures to prevent renaming the file to disallowed file...
{'CVE-2020-4041'}
2022-04-19T19:02:28Z
2020-06-09T00:25:34Z
MODERATE
7.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4041', 'https://github.com/bolt/bolt/pull/7853', 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f', 'https://github.com/bolt/bolt/security/advisories/GHSA-68q3-7wjp-7q3j', 'https://github.com/advisories/GHSA-68q3-7wjp-7q3j', 'http://packetstormsec...
null
{'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'}
{'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'}
GHSA
GHSA-82v2-mx6x-wq7q
Incorrect Default Permissions in log4js
### Impact Default file permissions for log files created by the file, fileSync and dateFile appenders are world-readable (in unix). This could cause problems if log files contain sensitive information. This would affect any users that have not supplied their own permissions for the files via the mode parameter in the...
{'CVE-2022-21704'}
2022-04-19T19:03:20Z
2022-01-21T18:53:27Z
MODERATE
5.5
{'CWE-276'}
{'https://github.com/advisories/GHSA-82v2-mx6x-wq7q', 'https://github.com/log4js-node/log4js-node/blob/v6.4.0/CHANGELOG.md#640', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21704', 'https://github.com/log4js-node/log4js-node/pull/1141/commits/8042252861a1b65adb66931fdf702ead34fa9b76', 'https://github.com/log4js-node/str...
null
{'https://github.com/log4js-node/log4js-node/pull/1141/commits/8042252861a1b65adb66931fdf702ead34fa9b76'}
{'https://github.com/log4js-node/log4js-node/pull/1141/commits/8042252861a1b65adb66931fdf702ead34fa9b76'}
GHSA
GHSA-c2h3-6mxw-7mvq
Insufficiently restricted permissions on plugin directories
### Impact A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setui...
{'CVE-2021-41103'}
2021-11-18T15:14:52Z
2021-10-04T20:14:47Z
MODERATE
5.9
{'CWE-22'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41103', 'https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8', 'https://lists.fedoraproject.org/archives/li...
null
{'https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8'}
{'https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8'}
GHSA
GHSA-pqrv-8r2f-7278
Crash due to erroneous `StatusOr` in TensorFlow
### Impact A `GraphDef` from a TensorFlow `SavedModel` can be maliciously altered to cause a TensorFlow process to crash due to encountering [a `StatusOr` value that is an error and forcibly extracting the value from it](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/c...
{'CVE-2022-23590'}
2022-02-11T20:00:43Z
2022-02-09T23:29:38Z
MODERATE
5.9
{'CWE-754'}
{'https://github.com/tensorflow/tensorflow/commit/955059813cc325dc1db5e2daa6221271406d4439', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23590', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pqrv-8r2f-7278', 'https://github.com/advisories/GHSA-pqrv-8r2f-7278', 'https://github.com/tensorflow/tensorfl...
null
{'https://github.com/tensorflow/tensorflow/commit/955059813cc325dc1db5e2daa6221271406d4439'}
{'https://github.com/tensorflow/tensorflow/commit/955059813cc325dc1db5e2daa6221271406d4439'}
GHSA
GHSA-vmf5-924f-25f2
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1106, CVE-2019-1107.
{'CVE-2019-1103'}
2021-03-29T20:59:12Z
2021-03-29T20:59:12Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-vmf5-924f-25f2', 'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1103', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1103', 'https://github.com/chakra-core/ChakraC...
null
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba'}
{'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}
GHSA
GHSA-cqp5-m4pq-gfgp
Prototype Pollution in defaults-deep
Versions of `default-deep` before 0.2.4 are vulnerable to prototype pollution ## Recommendation Update to version 0.2.4 or later.
{'CVE-2018-3723'}
2021-01-08T18:56:59Z
2018-07-26T15:18:43Z
LOW
0
{'CWE-471'}
{'https://github.com/jonschlinkert/defaults-deep/commit/c873f341327ad885ff4d0f23b3d3bca31b0343e5', 'https://github.com/advisories/GHSA-cqp5-m4pq-gfgp', 'https://hackerone.com/reports/310514', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3723', 'https://www.npmjs.com/advisories/581'}
null
{'https://github.com/jonschlinkert/defaults-deep/commit/c873f341327ad885ff4d0f23b3d3bca31b0343e5'}
{'https://github.com/jonschlinkert/defaults-deep/commit/c873f341327ad885ff4d0f23b3d3bca31b0343e5'}
GHSA
GHSA-5f9h-9pjv-v6j7
Directory traversal in Rack::Directory app bundled with Rack
A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.
{'CVE-2020-8161'}
2021-01-08T21:28:30Z
2020-07-06T21:31:02Z
MODERATE
0
{'CWE-548'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8161', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html', 'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e', 'https://usn.ubuntu.com/4561-1/', 'https://hackerone.com/reports/434404', 'https://github.com/advisories/GHSA-5f9h-9pjv...
null
{'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e'}
{'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e'}
GHSA
GHSA-h3vq-wv8j-36gw
Cross-site Scripting in Scratch-Svg-Renderer
A DOM-based cross-site scripting (XSS) vulnerability in Scratch-Svg-Renderer v0.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted sb3 file.
{'CVE-2020-27428'}
2022-01-08T00:44:33Z
2022-01-08T00:44:33Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-h3vq-wv8j-36gw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27428', 'https://github.com/LLK/scratch-svg-renderer/commit/7c74ec7de3254143ec3c557677f5355a90a3d07f'}
null
{'https://github.com/LLK/scratch-svg-renderer/commit/7c74ec7de3254143ec3c557677f5355a90a3d07f'}
{'https://github.com/LLK/scratch-svg-renderer/commit/7c74ec7de3254143ec3c557677f5355a90a3d07f'}
GHSA
GHSA-5rq8-3wvf-wrfg
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20...
{'CVE-2019-0933'}
2021-03-29T20:59:01Z
2021-03-29T20:59:01Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0933', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0933', 'https://github.com/advisories/GHSA-5rq8-3wvf-wrfg', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraC...
null
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf'}
GHSA
GHSA-4365-fhm5-qcrx
Maliciously Crafted Model Archive Can Lead To Arbitrary File Write
### Impact An Archive Extraction (Zip Slip) vulnerability in the functionality that allows a user to load a trained model archive in Rasa 2.8.9 and older allows an attacker arbitrary write capability within specific directories using a malicious crafted archive file. ### Patches The vulnerability is fixed in Rasa 2.8....
{'CVE-2021-41127'}
2021-10-22T16:19:13Z
2021-10-22T16:19:13Z
HIGH
7.3
{'CWE-23', 'CWE-22'}
{'https://github.com/advisories/GHSA-4365-fhm5-qcrx', 'https://github.com/RasaHQ/rasa/commit/1b6b502f52d73b4f8cd1959ce724b8ad0eb33989', 'https://github.com/RasaHQ/rasa/security/advisories/GHSA-4365-fhm5-qcrx'}
null
{'https://github.com/RasaHQ/rasa/commit/1b6b502f52d73b4f8cd1959ce724b8ad0eb33989'}
{'https://github.com/RasaHQ/rasa/commit/1b6b502f52d73b4f8cd1959ce724b8ad0eb33989'}
GHSA
GHSA-624f-cqvr-3qw4
URL Redirection to Untrusted Site ('Open Redirect') in Flask-AppBuilder
### Impact If using Flask-AppBuilder OAuth, an attacker can share a carefully crafted URL with a trusted domain for an application built with Flask-AppBuilder, this URL can redirect a user to a malicious site. This is an open redirect vulnerability ### Patches Install Flask-AppBuilder 3.2.2 or above ### Workarounds ...
{'CVE-2021-32805'}
2021-09-09T13:33:27Z
2021-09-08T21:11:14Z
HIGH
7.2
{'CWE-601'}
{'https://github.com/advisories/GHSA-624f-cqvr-3qw4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32805', 'https://github.com/dpgaspar/Flask-AppBuilder/commit/6af28521589599b1dbafd6313256229ee9a4fa74', 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-624f-cqvr-3qw4', 'https://github.com/dpgaspar/Fl...
null
{'https://github.com/dpgaspar/Flask-AppBuilder/commit/6af28521589599b1dbafd6313256229ee9a4fa74'}
{'https://github.com/dpgaspar/Flask-AppBuilder/commit/6af28521589599b1dbafd6313256229ee9a4fa74'}
GHSA
GHSA-694p-xrhg-x3wm
CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request Header Injection')
### Vulnerability Micronaut's HTTP client is vulnerable to "HTTP Request Header Injection" due to not validating request headers passed to the client. Example of vulnerable code: ```java @Controller("/hello") public class HelloController { @Inject @Client("/") RxHttpClient client; @Get("/external-e...
{'CVE-2020-7611'}
2022-04-19T19:02:23Z
2020-03-30T20:54:55Z
CRITICAL
9.8
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7611', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-694p-xrhg-x3wm', 'https://snyk.io/vuln/SNYK-JAVA-IOMICRONAUT-561342', 'https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add', 'https://github....
null
{'https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d', 'https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add', 'https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1'}
{'https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d', 'https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add', 'https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1'}
GHSA
GHSA-4w23-c97g-fq5v
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4130'}
2022-01-05T20:33:16Z
2022-01-05T20:33:16Z
HIGH
8.8
{'CWE-352'}
{'https://huntr.dev/bounties/ccf073cd-7f54-4d51-89f2-6b4a2e4ae81e', 'https://github.com/advisories/GHSA-4w23-c97g-fq5v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4130', 'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae'}
null
{'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae'}
{'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae'}
GHSA
GHSA-pv4c-p2j5-38j4
Open Redirect in url-parse
Versions of `url-parse` before 1.4.3 returns the wrong hostname which could lead to Open Redirect, Server Side Request Forgery (SSRF), or Bypass Authentication Protocol vulnerabilities. ## Recommendation Update to version 1.4.3 or later.
{'CVE-2018-3774'}
2021-01-08T18:18:31Z
2018-08-13T15:02:15Z
HIGH
0
{'CWE-425'}
{'https://github.com/advisories/GHSA-pv4c-p2j5-38j4', 'https://hackerone.com/reports/384029', 'https://github.com/unshiftio/url-parse/commit/d7b582ec1243e8024e60ac0b62d2569c939ef5de', 'https://www.npmjs.com/advisories/678', 'https://github.com/unshiftio/url-parse/commit/53b1794e54d0711ceb52505e0f74145270570d5a', 'https...
null
{'https://github.com/unshiftio/url-parse/commit/53b1794e54d0711ceb52505e0f74145270570d5a', 'https://github.com/unshiftio/url-parse/commit/d7b582ec1243e8024e60ac0b62d2569c939ef5de'}
{'https://github.com/unshiftio/url-parse/commit/d7b582ec1243e8024e60ac0b62d2569c939ef5de', 'https://github.com/unshiftio/url-parse/commit/53b1794e54d0711ceb52505e0f74145270570d5a'}
GHSA
GHSA-phwq-j96m-2c2q
Template injection in ejs
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).
{'CVE-2022-29078'}
2022-04-27T14:36:25Z
2022-04-26T00:00:40Z
HIGH
0
{'CWE-74'}
{'https://github.com/mde/ejs/commit/15ee698583c98dadc456639d6245580d17a24baf', 'https://github.com/advisories/GHSA-phwq-j96m-2c2q', 'https://eslam.io/posts/ejs-server-side-template-injection-rce/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29078'}
null
{'https://github.com/mde/ejs/commit/15ee698583c98dadc456639d6245580d17a24baf'}
{'https://github.com/mde/ejs/commit/15ee698583c98dadc456639d6245580d17a24baf'}
GHSA
GHSA-xw79-hhv6-578c
Cross-Site Scripting in serve
Versions of `serve` prior to 10.0.2 are vulnerable to Cross-Site Scripting (XSS). The package does not encode output, allowing attackers to execute arbitrary JavaScript in the victim's browser if user-supplied input is rendered. ## Recommendation Upgrade to version 10.0.2 or later.
null
2021-09-28T16:54:34Z
2020-09-11T21:16:59Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-xw79-hhv6-578c', 'https://github.com/zeit/serve-handler/commit/65b4d4183a31a8076c78c40118acb0ca1b64f620', 'https://hackerone.com/reports/358641', 'https://hackerone.com/reports/398285', 'https://www.npmjs.com/advisories/971'}
null
{'https://github.com/zeit/serve-handler/commit/65b4d4183a31a8076c78c40118acb0ca1b64f620'}
{'https://github.com/zeit/serve-handler/commit/65b4d4183a31a8076c78c40118acb0ca1b64f620'}
GHSA
GHSA-xrpj-f9v6-2332
CSV injection in Craft CMS
# Withdrawn Duplicate of GHSA-h7vq-5qgw-jwwq
null
2021-10-18T19:09:51Z
2021-10-04T20:12:45Z
HIGH
8.8
{'CWE-1236', 'CWE-74'}
{'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824', 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq', 'https://github.com/advisories/GHSA-xrpj-f9v6-2332', 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e840...
null
{'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}
{'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}
GHSA
GHSA-v3q9-2p3m-7g43
Token reuse in github.com/ory/fosite
### Impact When using client authentication method "private_key_jwt" [1], OpenId specification says the following about assertion `jti`: > A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the pa...
{'CVE-2020-15222'}
2021-11-19T15:24:07Z
2021-05-24T16:57:52Z
HIGH
8.1
{'CWE-287', 'CWE-345'}
{'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9', 'https://github.com/advisories/GHSA-v3q9-2p3m-7g43', 'https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15222', 'https://github.com/ory/fosite/releases/tag/v0.31.0', 'https:...
null
{'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9'}
{'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9'}
GHSA
GHSA-5vq5-pg3r-9ph3
Path Traversal in Zope
Zope is an open-source web application server. This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities. Most Python modules are not available for using in TAL expressions that you can ...
{'CVE-2021-32674'}
2022-01-03T15:56:18Z
2021-06-10T17:22:08Z
HIGH
8.8
{'CWE-12', 'CWE-22'}
{'https://github.com/advisories/GHSA-5vq5-pg3r-9ph3', 'https://github.com/zopefoundation/Zope/commit/1d897910139e2c0b11984fc9b78c1da1365bec21', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-rpcg-f9q6-2mq6', 'https://pypi.org/project/Zope/', 'https://github.com/zopefoundation/Zope/security/advisories/...
null
{'https://github.com/zopefoundation/Zope/commit/1d897910139e2c0b11984fc9b78c1da1365bec21'}
{'https://github.com/zopefoundation/Zope/commit/1d897910139e2c0b11984fc9b78c1da1365bec21'}
GHSA
GHSA-pp7h-53gx-mx7r
Remote Memory Exposure in bl
A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() ca...
{'CVE-2020-8244'}
2021-05-10T16:25:30Z
2020-09-02T15:26:19Z
HIGH
6.5
{'CWE-126', 'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8244', 'https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e', 'https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466', 'https://github.com/advisories/GHSA-pp7h-53gx-mx7r', 'https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76e...
null
{'https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e', 'https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466', 'https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190'}
{'https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190', 'https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e', 'https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466'}
GHSA
GHSA-7wgr-7666-7pwj
Path Traversal in openapi-python-client
### Impact Path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk. Giving this a CVSS score of 3.0 (Low) with CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N/E:P/RL:U/RC:C ### Patches A fix is...
{'CVE-2020-15141'}
2022-04-19T19:02:33Z
2020-08-20T14:38:13Z
LOW
3
{'CWE-22'}
{'https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15141', 'https://pypi.org/project/openapi-python-client', 'https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746', 'https://github.com/tria...
null
{'https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746'}
{'https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746'}
GHSA
GHSA-7v7w-f7c6-f829
yetiforcecrm is vulnerable to Business Logic Errors
yetiforcecrm is vulnerable to Business Logic Errors.
{'CVE-2021-4111'}
2022-01-03T15:47:59Z
2021-12-16T21:01:15Z
HIGH
7.3
null
{'https://github.com/advisories/GHSA-7v7w-f7c6-f829', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4111', 'https://huntr.dev/bounties/8afc8981-baff-4082-b640-be535b29eb9a'}
null
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf'}
GHSA
GHSA-952p-fqcp-g8pc
HTML injection possibility in voucher code form in Shopware
### Impact HTML injection possibility in voucher code form ## Patches Patched in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarou...
{'CVE-2022-24746'}
2022-03-18T20:14:16Z
2022-03-10T17:49:26Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022?category=security-updates', 'https://github.com/advisories/GHSA-952p-fqcp-g8pc', 'https://github.com/shopware/platform/security/advisories/GHSA-95...
null
{'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6'}
{'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6'}
GHSA
GHSA-jhj6-5mh6-4pvf
Denial-of-Service within Docker container
### Impact If you run teler inside a Docker container and encounter `errors.Exit` function, it will cause denial-of-service (`SIGSEGV`) because it doesn't get process ID and process group ID of teler properly to kills. ### Patches Upgrade to the >= 0.0.1 version. ### Workarounds N/A ### References - https://github.c...
{'CVE-2020-26213'}
2021-10-11T21:06:20Z
2021-05-24T17:00:46Z
MODERATE
7.5
{'CWE-476'}
{'https://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7e', 'https://github.com/advisories/GHSA-jhj6-5mh6-4pvf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26213', 'https://github.com/kitabisa/teler/security/advisories/GHSA-jhj6-5mh6-4pvf'}
null
{'https://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7e'}
{'https://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7e'}
GHSA
GHSA-45q2-34rf-mr94
Code Injection in mquery
lib/utils.js in mquery before 3.2.3 allows a pollution attack because a special property (e.g., __proto__) can be copied during a merge or clone operation.
{'CVE-2020-35149'}
2020-12-18T18:23:43Z
2020-12-18T18:23:43Z
MODERATE
5.3
{'CWE-94'}
{'https://github.com/aheckmann/mquery/commit/792e69fd0a7281a0300be5cade5a6d7c1d468ad4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35149', 'https://github.com/advisories/GHSA-45q2-34rf-mr94'}
null
{'https://github.com/aheckmann/mquery/commit/792e69fd0a7281a0300be5cade5a6d7c1d468ad4'}
{'https://github.com/aheckmann/mquery/commit/792e69fd0a7281a0300be5cade5a6d7c1d468ad4'}
GHSA
GHSA-9735-p6r2-2hgh
Out-of-bounds write
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0884, CVE-2019-0918.
{'CVE-2019-0911'}
2021-03-29T21:00:00Z
2021-03-29T21:00:00Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0911', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0911', 'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337',...
null
{'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337'}
GHSA
GHSA-c38g-469g-cmgx
"Improper Neutralization of Special Elements in Output in helm.sh/helm/v3"
Since Helm 2 was released, a well-documented aspect of Helm is that the Helm chart's version number MUST follow the SemVer2 specification. In the past, Helm would not permit charts with malformed versions. At some point, a patch was merged that changed this - On a version parse error, the version number was simply pas...
{'CVE-2021-21303'}
2021-06-23T18:14:40Z
2021-06-23T18:14:40Z
MODERATE
5.9
{'CWE-74', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21303', 'https://github.com/helm/helm/releases/tag/v3.5.2', 'https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a', 'https://github.com/helm/helm/security/advisories/GHSA-c38g-469g-cmgx', 'https://github.com/advisories/GHSA-c38g-469g-cmgx'}
null
{'https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a'}
{'https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a'}
GHSA
GHSA-733f-44f3-3frw
Open redirect
macaron before 1.3.7 has an open redirect in the static handler, as demonstrated by the http://127.0.0.1:4000//example.com/ URL.
{'CVE-2020-12666'}
2021-05-18T21:08:35Z
2021-05-18T21:08:35Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/go-macaron/macaron/pull/199/commits/6bd9385542f7133467ab7d09a5f28f7d5dc52af7', 'https://github.com/go-macaron/macaron/releases/tag/v1.3.7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12666', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QEUOHRC4EN4...
null
{'https://github.com/go-macaron/macaron/pull/199/commits/6bd9385542f7133467ab7d09a5f28f7d5dc52af7'}
{'https://github.com/go-macaron/macaron/pull/199/commits/6bd9385542f7133467ab7d09a5f28f7d5dc52af7'}
GHSA
GHSA-hxcm-v35h-mg2x
Prototype Pollution
A vulnerability was found in querystringify before 2.0.0. It's possible to override built-in properties of the resulting query string object if a malicious string is inserted in the query string.
null
2021-02-25T17:25:44Z
2019-06-07T21:12:50Z
HIGH
0
{'CWE-1312'}
{'https://github.com/unshiftio/querystringify/pull/19', 'https://github.com/unshiftio/querystringify/commit/422eb4f6c7c28ee5f100dcc64177d3b68bb2b080', 'https://github.com/advisories/GHSA-hxcm-v35h-mg2x'}
null
{'https://github.com/unshiftio/querystringify/commit/422eb4f6c7c28ee5f100dcc64177d3b68bb2b080'}
{'https://github.com/unshiftio/querystringify/commit/422eb4f6c7c28ee5f100dcc64177d3b68bb2b080'}
GHSA
GHSA-699q-wcff-g9mj
Unsafe deserialization in Yii 2
### Impact Remote code execution in case application calls `unserialize()` on user input containing specially crafted string. ### Patches 2.0.38 ### Workarounds Add the following to BatchQueryResult.php: ```php public function __sleep() { throw new \BadMethodCallException('Cannot serialize '.__CLASS__); } pu...
{'CVE-2020-15148'}
2022-04-19T19:02:33Z
2020-09-15T18:19:56Z
HIGH
8.9
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15148', 'https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj', 'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99', 'https://github.com/advisories/GHSA-699q-wcff-g9mj'}
null
{'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99'}
{'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99'}
GHSA
GHSA-pcqq-5962-hvcw
Denial of Service in uap-core when processing crafted User-Agent strings
### Impact Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. ### Patches Please update `uap-ruby` to &gt;= v2.6.0 #...
null
2022-04-19T19:02:24Z
2020-03-10T18:02:49Z
HIGH
0
null
{'https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a', 'https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw', 'https://github.com/advisories/GHSA-pcqq-5962-hvcw'}
null
{'https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a'}
{'https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a'}
GHSA
GHSA-5jxc-hmqf-3f73
Cross-Site Scripting in grav
grav prior to version 1.7.24 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3904'}
2021-11-01T19:17:31Z
2021-11-01T19:17:31Z
MODERATE
6.3
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3904', 'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d', 'https://github.com/advisories/GHSA-5jxc-hmqf-3f73', 'https://huntr.dev/bounties/b1182515-d911-4da9-b4f7-b4c341a62a8d'}
null
{'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d'}
{'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d'}
GHSA
GHSA-xf5p-87ch-gxw2
Regular Expression Denial of Service in marked
Versions of `marked` prior to 0.6.2 and later than 0.3.14 are vulnerable to Regular Expression Denial of Service. Email addresses may be evaluated in quadratic time, allowing attackers to potentially crash the node process due to resource exhaustion. ## Recommendation Upgrade to version 0.6.2 or later.
null
2021-08-04T20:53:01Z
2019-06-05T14:10:03Z
MODERATE
5.3
{'CWE-400'}
{'https://www.npmjs.com/advisories/812', 'https://github.com/markedjs/marked/issues/1070', 'https://github.com/markedjs/marked/pull/1460', 'https://snyk.io/vuln/SNYK-JS-MARKED-174116', 'https://github.com/markedjs/marked/commit/b15e42b67cec9ded8505e9d68bb8741ad7a9590d', 'https://github.com/advisories/GHSA-xf5p-87ch-gxw...
null
{'https://github.com/markedjs/marked/commit/b15e42b67cec9ded8505e9d68bb8741ad7a9590d'}
{'https://github.com/markedjs/marked/commit/b15e42b67cec9ded8505e9d68bb8741ad7a9590d'}
GHSA
GHSA-h74j-692g-48mq
Path Traversal in MHolt Archiver
All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final...
{'CVE-2019-10743'}
2021-05-18T15:31:53Z
2021-05-18T15:31:53Z
MODERATE
5.5
{'CWE-29'}
{'https://github.com/advisories/GHSA-h74j-692g-48mq', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10743', 'https://github.com/mholt/archiver/pull/169', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728,', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/mholt/archiver/pull/203', ...
null
{'https://github.com/mholt/archiver/commit/8217ed3a206c0473b4ec1aff51375b398838073a'}
{'https://github.com/mholt/archiver/commit/8217ed3a206c0473b4ec1aff51375b398838073a'}
GHSA
GHSA-fp63-499m-hq6m
Files or Directories Accessible to External Parties in ether/logs
### Impact A vulnerability was found that allowed authenticated admin users to access any file on the server. ### Patches The vulnerability has been fixed in 3.0.4. ### Workarounds We recommend disabling the plugin if untrustworthy sources have admin access. ### For more information If you have any questions or comm...
{'CVE-2021-32752'}
2021-07-12T23:09:42Z
2021-07-12T16:53:00Z
HIGH
7.2
{'CWE-552'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32752', 'https://github.com/ethercreative/logs/security/advisories/GHSA-fp63-499m-hq6m', 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4', 'https://github.com/ethercreative/logs/releases/tag/3.0.4', 'https://github.com/advisories/GHSA-fp...
null
{'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'}
{'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'}
GHSA
GHSA-g98m-96g9-wfjq
Insecure path handling in Bundler
Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in th...
{'CVE-2019-3881'}
2021-11-03T14:52:01Z
2021-05-10T14:53:59Z
HIGH
7
{'CWE-552', 'CWE-427'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-3881', 'https://github.com/rubygems/bundler/pull/7416/commits/65cfebb041c454c246aaf32a177b0243915a9998', 'https://github.com/advisories/GHSA-g98m-96g9-wfjq', 'https://bugzilla.redhat.com/show_bug.cgi?id=1651826', 'https://github.com/rubygems/bundler/issues/6501'}
null
{'https://github.com/rubygems/bundler/pull/7416/commits/65cfebb041c454c246aaf32a177b0243915a9998'}
{'https://github.com/rubygems/bundler/pull/7416/commits/65cfebb041c454c246aaf32a177b0243915a9998'}
GHSA
GHSA-3vjf-82ff-p4r3
Incorrect protocol extraction via \r, \n and \t characters
\r, \n and \t characters in user-input URLs can potentially lead to incorrect protocol extraction when using npm package urijs prior to version 1.19.11. This can lead to XSS when the module is used to prevent passing in malicious javascript: links into HTML or Javascript (see following example): ```` const parse = req...
{'CVE-2022-1243'}
2022-04-14T20:13:56Z
2022-04-06T00:01:31Z
HIGH
7.2
{'CWE-20'}
{'https://github.com/advisories/GHSA-3vjf-82ff-p4r3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1243', 'https://huntr.dev/bounties/8c5afc47-1553-4eba-a98e-024e4cc3dfb7', 'https://github.com/medialize/uri.js/commit/b0c9796aa1a95a85f40924fb18b1e5da3dc8ffae'}
null
{'https://github.com/medialize/uri.js/commit/b0c9796aa1a95a85f40924fb18b1e5da3dc8ffae'}
{'https://github.com/medialize/uri.js/commit/b0c9796aa1a95a85f40924fb18b1e5da3dc8ffae'}
GHSA
GHSA-m697-4v8f-55qg
Header dropping in traefik
# Impact There exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however, the Traefik team has addressed this issue to prevent any potential abuse. # Details ...
{'CVE-2021-32813'}
2021-08-31T20:57:11Z
2021-08-05T17:04:21Z
MODERATE
4.8
{'CWE-913'}
{'https://github.com/traefik/traefik/releases/tag/v2.4.13', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32813', 'https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9', 'https://github.com/traefik/traefik/security/advisories/GHSA-m697-4v8f-55qg', 'https://github.com/advisories/GHS...
null
{'https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9'}
{'https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9'}
GHSA
GHSA-2877-693q-pj33
OS Command Injection in GenieACS
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
{'CVE-2021-46704'}
2022-03-14T21:30:23Z
2022-03-07T00:00:40Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6', 'https://github.com/genieacs/genieacs/releases/tag/v1.2.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46704', 'https://github.com/advisories/GHSA-2877-693q-pj33'}
null
{'https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6'}
{'https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6'}
GHSA
GHSA-j4f2-536g-r55m
Resource exhaustion in engine.io
Engine.IO before 4.0.0 allows attackers to cause a denial of service (resource consumption) via a POST request to the long polling transport.
{'CVE-2020-36048'}
2022-02-09T22:29:04Z
2022-02-09T22:29:04Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/socketio/engine.io/commit/734f9d1268840722c41219e69eb58318e0b2ac6b', 'https://github.com/bcaller/kill-engine-io', 'https://blog.caller.xyz/socketio-engineio-dos/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36048', 'https://github.com/advisories/GHSA-j4f2-536g-r55m'}
null
{'https://github.com/socketio/engine.io/commit/734f9d1268840722c41219e69eb58318e0b2ac6b'}
{'https://github.com/socketio/engine.io/commit/734f9d1268840722c41219e69eb58318e0b2ac6b'}
GHSA
GHSA-88jf-7rch-32qc
Path Traversal in github.com/unknwon/cae/tz
"The ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "..". This allows an attacker to add or replace files system-wide."
{'CVE-2020-7668'}
2022-01-04T19:33:15Z
2021-05-18T20:31:18Z
HIGH
7.5
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAETZ-570384', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7668', 'https://github.com/advisories/GHSA-88jf-7rch-32qc', 'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'}
null
{'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'}
{'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'}
GHSA
GHSA-c45w-2wxr-pp53
Heap OOB read in `tf.raw_ops.Dequantize`
### Impact Due to lack of validation in `tf.raw_ops.Dequantize`, an attacker can trigger a read from outside of bounds of heap allocated data: ```python import tensorflow as tf input_tensor=tf.constant( [75, 75, 75, 75, -6, -9, -10, -10, -10, -10, -10, -10, -10, -10, -10, -10,\ -10, -10, -10, -10, -10, -10, -10, ...
{'CVE-2021-29582'}
2021-05-21T14:26:32Z
2021-05-21T14:26:32Z
LOW
2.5
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c45w-2wxr-pp53', 'https://github.com/advisories/GHSA-c45w-2wxr-pp53', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29582', 'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b'}
null
{'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b'}
{'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b'}
GHSA
GHSA-w4vg-rf63-f3j3
Arbitrary code using "crafted image file" approach affecting Pillow
Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.
{'CVE-2016-9190'}
2022-04-26T18:06:20Z
2018-07-12T14:45:42Z
HIGH
7.8
{'CWE-284'}
{'https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af', 'http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html', 'http://www.securityfocus.com/bid/94234', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/python-pillow/Pillow/issues/2105', 'http://w...
null
{'https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af'}
{'https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af'}
GHSA
GHSA-5vfx-8w6m-h3v4
Authentication bypass due to improper user-provided security token verification
A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account ...
{'CVE-2021-41129'}
2021-10-12T21:45:12Z
2021-10-04T20:14:13Z
HIGH
8.1
{'CWE-502', 'CWE-639', 'CWE-807'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41129', 'https://github.com/pterodactyl/panel/blob/v1.6.2/CHANGELOG.md#v162', 'https://github.com/pterodactyl/panel/releases/tag/v1.6.2', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-5vfx-8w6m-h3v4', 'https://github.com/advisories/GHSA-5vfx-8w6m-h3v4', 'http...
null
{'https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977'}
{'https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977'}
GHSA
GHSA-9vp5-m38w-j776
Aliases are never checked in helm
### Impact During a security audit of Helm's code base, security researchers at Trail of Bits identified a bug in which the `alias` field on a `Chart.yaml` is not properly sanitized. This could lead to the injection of unwanted information into a chart. ### Patches This issue has been patched in Helm 3.3.2 and 2.16....
{'CVE-2020-15184'}
2021-11-19T15:29:13Z
2021-05-24T16:56:58Z
LOW
3.7
{'CWE-74', 'CWE-20'}
{'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://github.com/helm/helm/security/advisories/GHSA-9vp5-m38w-j776', 'https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15184', 'https://github.com/advisories/GHSA-...
null
{'https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850', 'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946'}
{'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850'}
GHSA
GHSA-vgmw-9cww-qq99
Incorrect Authorization in calibreweb
calibreweb prior to version 0.6.16 contains an Incorrect Authorization vulnerability.
{'CVE-2022-0273'}
2022-02-16T22:04:14Z
2022-01-31T00:00:29Z
MODERATE
6.5
{'CWE-863', 'CWE-284'}
{'https://github.com/advisories/GHSA-vgmw-9cww-qq99', 'https://huntr.dev/bounties/8f27686f-d698-4ab6-8ef0-899125792f13', 'https://github.com/janeczku/calibre-web/commit/0c0313f375bed7b035c8c0482bbb09599e16bfcf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0273'}
null
{'https://github.com/janeczku/calibre-web/commit/0c0313f375bed7b035c8c0482bbb09599e16bfcf'}
{'https://github.com/janeczku/calibre-web/commit/0c0313f375bed7b035c8c0482bbb09599e16bfcf'}
GHSA
GHSA-54xj-q58h-9x57
Arbitrary File Write in iobroker.admin
Versions of `iobroker.admin` prior to 3.6.12 are vulnerable to Path Traversal. The package fails to restrict access to folders outside of the intended folder in the `/log/` route, which may allow attackers to include arbitrary files in the system. An attacker would need to be authenticated to perform the attack but the...
{'CVE-2019-10765'}
2021-10-01T20:14:11Z
2020-09-04T15:24:56Z
CRITICAL
9.8
{'CWE-22'}
{'https://github.com/advisories/GHSA-54xj-q58h-9x57', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10765', 'https://www.npmjs.com/advisories/1346', 'https://snyk.io/vuln/SNYK-JS-IOBROKERADMIN-534634', 'https://github.com/ioBroker/ioBroker.admin/commit/16b2b325ab47896090bc7f54b77b0a97ed74f5cd'}
null
{'https://github.com/ioBroker/ioBroker.admin/commit/16b2b325ab47896090bc7f54b77b0a97ed74f5cd'}
{'https://github.com/ioBroker/ioBroker.admin/commit/16b2b325ab47896090bc7f54b77b0a97ed74f5cd'}
GHSA
GHSA-3qgw-p4fm-x7gf
Division by zero in TFLite's convolution code
### Impact TFLite's [convolution code](https://github.com/tensorflow/tensorflow/blob/09c73bca7d648e961dd05898292d91a8322a9d45/tensorflow/lite/kernels/conv.cc) has multiple division where the divisor is controlled by the user and not checked to be non-zero. For example: ```cc const int input_size = NumElements(input) ...
{'CVE-2021-29594'}
2021-05-21T14:27:45Z
2021-05-21T14:27:45Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qgw-p4fm-x7gf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29594', 'https://github.com/advisories/GHSA-3qgw-p4fm-x7gf', 'https://github.com/tensorflow/tensorflow/commit/ff489d95a9006be080ad14feb378f2b4dac35552'}
null
{'https://github.com/tensorflow/tensorflow/commit/ff489d95a9006be080ad14feb378f2b4dac35552'}
{'https://github.com/tensorflow/tensorflow/commit/ff489d95a9006be080ad14feb378f2b4dac35552'}
GHSA
GHSA-53m6-44rc-h2q5
Missing server signature validation in OctoberCMS
### Impact This advisory affects authors of plugins and themes listed on the October CMS marketplace where an end-user will inadvertently expose authors to potential financial loss by entering their private license key into a compromised server. It has been disclosed that a project fork of October CMS v1.0 is using a...
{'CVE-2022-23655'}
2022-03-08T18:23:38Z
2022-02-24T13:09:30Z
MODERATE
4.8
{'CWE-347'}
{'https://github.com/octobercms/october/security/advisories/GHSA-53m6-44rc-h2q5', 'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a', 'https://github.com/advisories/GHSA-53m6-44rc-h2q5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23655'}
null
{'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a'}
{'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a'}