ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-7h43-gx24-p529 | Prototype pollution in json8 | This affects the package json8 before 1.0.3. The function adds in the target object the property specified in the path, however it does not properly check the key being set, leading to a prototype pollution. | {'CVE-2020-7770'} | 2021-05-10T19:17:05Z | 2021-05-10T19:17:05Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-JSON8-1017116', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7770', 'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e', 'https://github.com/advisories/GHSA-7h43-gx24-p529', 'https://www.npmjs.com/package/json8'} | null | {'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e'} | {'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e'} |
GHSA | GHSA-7f33-f4f5-xwgw | In-band key negotiation issue in AWS S3 Crypto SDK for golang | ### Summary
The golang AWS S3 Crypto SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the bucket in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when e... | {'CVE-2020-8912'} | 2022-04-19T19:02:32Z | 2022-02-11T23:23:13Z | LOW | 2.5 | {'CWE-327'} | {'https://github.com/aws/aws-sdk-go/commit/1e84382fa1c0086362b5a4b68e068d4f8518d40e', 'https://github.com/aws/aws-sdk-go/pull/3403', 'https://github.com/advisories/GHSA-7f33-f4f5-xwgw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8912', 'https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw... | null | {'https://github.com/aws/aws-sdk-go/commit/1e84382fa1c0086362b5a4b68e068d4f8518d40e', 'https://github.com/aws/aws-sdk-go/commit/ae9b9fd92af132cfd8d879809d8611825ba135f4'} | {'https://github.com/aws/aws-sdk-go/commit/1e84382fa1c0086362b5a4b68e068d4f8518d40e', 'https://github.com/aws/aws-sdk-go/commit/ae9b9fd92af132cfd8d879809d8611825ba135f4'} |
GHSA | GHSA-4278-2v5v-65r4 | Heap buffer overflow in `RaggedBinCount` | ### Impact
If the `splits` argument of `RaggedBincount` does not specify a valid [`SparseTensor`](https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow:
```python
import tensorflow as tf
tf.raw_ops.RaggedBincount(splits=[0], values=[1,1,1,1,1], size=5, ... | {'CVE-2021-29512'} | 2021-05-21T14:20:40Z | 2021-05-21T14:20:40Z | LOW | 2.5 | {'CWE-787', 'CWE-120'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29512', 'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4278-2v5v-65r4', 'https://github.com/advisories/GHSA-4278-2v5v-65r4'} | null | {'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'} | {'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'} |
GHSA | GHSA-6cp7-g972-w9m9 | Use of a Key Past its Expiration Date and Insufficient Session Expiration in Maddy Mail Server | ### Impact
Any configuration on any maddy version <0.5.4 using auth.pam is affected.
No password expiry or account expiry checking is done when authenticating using PAM.
### Patches
Patch is available as part of the 0.5.4 release.
### Workarounds
If /etc/shadow authentication is used, it is possible to replace au... | {'CVE-2022-24732'} | 2022-03-18T20:12:31Z | 2022-03-07T16:59:31Z | MODERATE | 6.3 | {'CWE-324', 'CWE-613'} | {'https://github.com/advisories/GHSA-6cp7-g972-w9m9', 'https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583', 'https://github.com/foxcpp/maddy/releases/tag/v0.5.4', 'https://github.com/foxcpp/maddy/security/advisories/GHSA-6cp7-g972-w9m9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24732'} | null | {'https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583'} | {'https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583'} |
GHSA | GHSA-rfw2-x9f8-2f6m | Cross-Site Scripting | LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar. | {'CVE-2021-26722'} | 2021-04-30T17:27:53Z | 2021-04-30T17:27:53Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/linkedin/oncall/issues/341', 'https://github.com/advisories/GHSA-rfw2-x9f8-2f6m', 'https://pypi.org/project/oncall/', 'https://github.com/linkedin/oncall/commit/843bc106a1c1b1699e9e52b6b0d01c7efe1d6225', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26722'} | null | {'https://github.com/linkedin/oncall/commit/843bc106a1c1b1699e9e52b6b0d01c7efe1d6225'} | {'https://github.com/linkedin/oncall/commit/843bc106a1c1b1699e9e52b6b0d01c7efe1d6225'} |
GHSA | GHSA-px3r-jm9g-c8w8 | Moderate severity vulnerability that affects rails-html-sanitizer | There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar ... | {'CVE-2018-3741'} | 2021-01-08T18:19:13Z | 2018-04-26T15:41:10Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3741', 'https://github.com/advisories/GHSA-px3r-jm9g-c8w8'} | null | {'https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae'} | {'https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae'} |
GHSA | GHSA-m296-j53x-xv95 | Data races in tiny_future | `tiny_future` contains a light-weight implementation of `Future`s. The `Future`
type it has lacked bound on its `Send` and `Sync` traits.
This allows for a bug where non-thread safe types such as `Cell` can be used in
`Future`s and cause data races in concurrent programs.
The flaw was corrected in commit `c791919` by... | null | 2021-08-25T21:00:32Z | 2021-08-25T21:00:32Z | MODERATE | 0 | {'CWE-362'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0118.html', 'https://github.com/KizzyCode/tiny_future/commit/7ab8a264980d23c2ed64e72f4636f38b7381eb39', 'https://github.com/KizzyCode/tiny_future/commit/c7919199a0f6d1ce0e3c33499d1b37f862c990e4', 'https://github.com/KizzyCode/tiny_future/issues/1', 'https://github.com/advis... | null | {'https://github.com/KizzyCode/tiny_future/commit/c7919199a0f6d1ce0e3c33499d1b37f862c990e4', 'https://github.com/KizzyCode/tiny_future/commit/7ab8a264980d23c2ed64e72f4636f38b7381eb39'} | {'https://github.com/KizzyCode/tiny_future/commit/c7919199a0f6d1ce0e3c33499d1b37f862c990e4', 'https://github.com/KizzyCode/tiny_future/commit/7ab8a264980d23c2ed64e72f4636f38b7381eb39'} |
GHSA | GHSA-crjr-9rc5-ghw8 | Inefficient Regular Expression Complexity in Nokogiri | ## Summary
Nokogiri `< v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents.
## Mitigation
Upgrade to Nokogiri `>= 1.13.4`.
## Severity
The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.1... | {'CVE-2022-24836'} | 2022-04-26T18:00:11Z | 2022-04-11T21:18:06Z | HIGH | 7.5 | {'CWE-400', 'CWE-1333'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24836', 'https://github.com/advisories/GHSA-crjr-9rc5-ghw8', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDCWR... | null | {'https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd'} | {'https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd'} |
GHSA | GHSA-f4cj-3q3h-884r | Partial authorization bypass on document save in xwiki-platform | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with SCRIPT right (EDIT right before XWiki 7.4) can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. It has... | {'CVE-2022-23615'} | 2022-05-05T18:01:30Z | 2022-02-09T21:21:53Z | MODERATE | 5.4 | {'CWE-863'} | {'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe', 'https://github.com/advisories/GHSA-f4cj-3q3h-884r', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23615', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f4cj-3q3h-884r', 'https://jira.xwiki.org/browse/XWIKI-5024... | null | {'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe'} | {'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe'} |
GHSA | GHSA-6x77-rpqf-j6mw | High severity vulnerability that affects ejs | nodejs ejs version older than 2.5.5 is vulnerable to a denial-of-service due to weak input validation in the ejs.renderFile() | {'CVE-2017-1000189'} | 2021-09-02T19:10:59Z | 2018-03-05T18:54:33Z | HIGH | 7.5 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-1000189', 'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f', 'http://www.securityfocus.com/bid/101893', 'https://github.com/advisories/GHSA-6x77-rpqf-j6mw'} | null | {'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'} | {'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'} |
GHSA | GHSA-8h4j-vm3r-vcq3 | Use after free in rusqlite | An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via an Auxdata API use-after-free. | {'CVE-2020-35870'} | 2021-08-25T20:47:48Z | 2021-08-25T20:47:48Z | CRITICAL | 9.8 | {'CWE-416'} | {'https://github.com/rusqlite/rusqlite/commit/2ef3628dac35aeba0a97d5fb3a57746b4e1d62b3', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://github.com/advisories/GHSA-8h4j-vm3r-vcq3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35870'} | null | {'https://github.com/rusqlite/rusqlite/commit/2ef3628dac35aeba0a97d5fb3a57746b4e1d62b3'} | {'https://github.com/rusqlite/rusqlite/commit/2ef3628dac35aeba0a97d5fb3a57746b4e1d62b3'} |
GHSA | GHSA-gq4h-f254-7cw9 | Data races in ticketed_lock | Affected versions of this crate unconditionally implemented `Send` for `ReadTicket<T>` & `WriteTicket<T>`.
This allows to send non-Send `T` to other threads.
This can allows creating data races by cloning types with internal mutability and sending them to other threads (as `T` of `ReadTicket<T>`/`WriteTicket<T>`). Suc... | null | 2021-08-25T21:00:34Z | 2021-08-25T21:00:34Z | MODERATE | 0 | {'CWE-362'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0119.html', 'https://github.com/kvark/ticketed_lock/issues/7', 'https://github.com/kvark/ticketed_lock/pull/8/commits/a986a9335d591fa5c826157d1674d47aa525357f', 'https://github.com/advisories/GHSA-gq4h-f254-7cw9'} | null | {'https://github.com/kvark/ticketed_lock/pull/8/commits/a986a9335d591fa5c826157d1674d47aa525357f'} | {'https://github.com/kvark/ticketed_lock/pull/8/commits/a986a9335d591fa5c826157d1674d47aa525357f'} |
GHSA | GHSA-jjv7-qpx3-h62q | Denial-of-Service Memory Exhaustion in qs | Versions prior to 1.0 of `qs` are affected by a denial of service condition. This condition is triggered by parsing a crafted string that deserializes into very large sparse arrays, resulting in the process running out of memory and eventually crashing.
## Recommendation
Update to version 1.0.0 or later. | {'CVE-2014-7191'} | 2021-09-14T19:46:49Z | 2017-10-24T18:33:36Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-jjv7-qpx3-h62q', 'https://github.com/visionmedia/node-querystring/issues/104', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96729', 'https://access.redhat.com/errata/RHSA-2016:1380', 'http://www-01.ibm.com/support/docview.wss?uid=swg21687263', 'http://secunia.com/advisories... | null | {'https://github.com/raymondfeng/node-querystring/commit/43a604b7847e56bba49d0ce3e222fe89569354d8'} | {'https://github.com/raymondfeng/node-querystring/commit/43a604b7847e56bba49d0ce3e222fe89569354d8'} |
GHSA | GHSA-gwpf-62xp-vrg6 | Information Exposure in cordova-android | Versions of `cordova-android` prior to 6.0.0 are vulnerable to Information Exposure through log files. The application calls methods of the Log class. Messages passed to these methods (Log.v(), Log.d(), Log.i(), Log.w(), and Log.e()) are stored in a series of circular buffers on the device. By default, a maximum of fou... | {'CVE-2016-6799'} | 2021-09-28T16:53:05Z | 2020-09-11T21:14:49Z | HIGH | 7.5 | {'CWE-532'} | {'http://www.securityfocus.com/bid/98365', 'https://snyk.io/vuln/SNYK-JS-CORDOVAANDROID-174935', 'https://github.com/apache/cordova-android/commit/4a0a7bc424fae14c9689f4a8a2dc250ae3a47f82', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6799', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6799', 'https://github.... | null | {'https://github.com/apache/cordova-android/commit/4a0a7bc424fae14c9689f4a8a2dc250ae3a47f82'} | {'https://github.com/apache/cordova-android/commit/4a0a7bc424fae14c9689f4a8a2dc250ae3a47f82'} |
GHSA | GHSA-gg84-qgv9-w4pq | CRLF injection in httplib2 | ### Impact
Attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server.
Impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping.
### Patches
P... | {'CVE-2020-11078'} | 2022-04-19T19:02:26Z | 2020-05-20T15:55:47Z | LOW | 6.8 | {'CWE-93'} | {'https://lists.debian.org/debian-lts-announce/2020/06/msg00000.html', 'https://lists.apache.org/thread.html/rad8872fc99f670958c2774e2bf84ee32a3a0562a0c787465cf3dfa23@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r23711190c2e98152cb6f216b95090d5eeb978543bb7e0bad22ce47fc@%3Cissues.beam.apache.org%... | null | {'https://github.com/httplib2/httplib2/commit/a1457cc31f3206cf691d11d2bf34e98865873e9e'} | {'https://github.com/httplib2/httplib2/commit/a1457cc31f3206cf691d11d2bf34e98865873e9e'} |
GHSA | GHSA-8fxw-76px-3rxv | Memory leak in Tensorflow | ### Impact
If a user passes a list of strings to `dlpack.to_dlpack` there is a memory leak following an expected validation failure:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L100-L104
The allocated memory is from
https://github.com/tensorflow/t... | {'CVE-2020-15192'} | 2021-08-26T15:09:35Z | 2020-09-25T18:28:17Z | MODERATE | 4.3 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15192', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fxw-76px-3rxv', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-8fxw-76px-3rxv', 'https://github.com/tensorflow/tensorflow/commit/22e0... | null | {'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'} | {'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'} |
GHSA | GHSA-3c9c-2p65-qvwv | Prototype pollution in aurelia-path | ### Impact
The vulnerability exposes Aurelia application that uses `aurelia-path` package to parse a string. The majority of this will be Aurelia applications that employ the `aurelia-router` package. An example is this could allow an attacker to change the prototype of base object class `Object` by tricking an applica... | {'CVE-2021-41097'} | 2022-04-19T19:03:10Z | 2021-09-27T20:12:16Z | HIGH | 9.1 | {'CWE-1321', 'CWE-915'} | {'https://github.com/aurelia/path/commit/7c4e235433a4a2df9acc313fbe891758084fdec1', 'https://www.npmjs.com/package/aurelia-path', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41097', 'https://github.com/advisories/GHSA-3c9c-2p65-qvwv', 'https://github.com/aurelia/path/security/advisories/GHSA-3c9c-2p65-qvwv', 'https://gi... | null | {'https://github.com/aurelia/path/commit/7c4e235433a4a2df9acc313fbe891758084fdec1'} | {'https://github.com/aurelia/path/commit/7c4e235433a4a2df9acc313fbe891758084fdec1'} |
GHSA | GHSA-36m2-8rhx-f36j | Sandbox bypass in Latte templates | ### Impact
The problem affects users who use the sandbox in Latte and templates from untrusted sources.
### Patches
Sandbox first appeared in Latte 2.8.0. The issue is fixed in the versions 2.8.8, 2.9.6 and 2.10.8.
### References
The issues were discovered by
- JinYiTong (https://github.com/JinYiTong)
- 赵钰迪 <2021201... | {'CVE-2022-21648'} | 2022-04-19T19:03:19Z | 2022-01-06T23:17:07Z | HIGH | 8.2 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21648', 'https://github.com/advisories/GHSA-36m2-8rhx-f36j', 'https://github.com/nette/latte/security/advisories/GHSA-36m2-8rhx-f36j', 'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0'} | null | {'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0'} | {'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0'} |
GHSA | GHSA-66q9-f7ff-mmx6 | Local file inclusion vulnerability in http4s | ### Impact
This vulnerability applies to all users of:
* `org.http4s.server.staticcontent.FileService`
* `org.http4s.server.staticcontent.ResourceService`
* `org.http4s.server.staticcontent.WebjarService`
#### Path escaping
URI normalization is applied incorrectly. Requests whose path info contain `../` or `//` can... | {'CVE-2020-5280'} | 2021-01-14T17:48:19Z | 2020-03-25T17:35:51Z | CRITICAL | 7.6 | {'CWE-23'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5280', 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca', 'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec', 'https://github.com/advisories/GHSA-66q9-f7ff-mmx6', 'https://github.com/http4s/http4s/security/advis... | null | {'https://github.com/http4s/http4s/commit/b87f31b2292dabe667bec3b04ce66176c8a3e17b', 'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec', 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca'} | {'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec', 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca', 'https://github.com/http4s/http4s/commit/b87f31b2292dabe667bec3b04ce66176c8a3e17b'} |
GHSA | GHSA-47wr-426j-fr82 | Symbolic links in an unpacking routine may enable attackers to read and/or write to arbitrary locations in dbdeployer | ### Impact
_Users unpacking a tarball through dbdeployer may use a maliciously packaged tarball that contains symlinks to files external to the target. In such scenario, an attacker could induce dbdeployer to write into a system file, thus altering the computer defences._
### Mitigating factors
For the attach to succe... | {'CVE-2020-26277'} | 2022-04-19T19:02:43Z | 2022-02-12T00:14:07Z | MODERATE | 6.1 | {'CWE-59'} | {'https://github.com/datacharmer/dbdeployer/security/advisories/GHSA-47wr-426j-fr82', 'https://github.com/advisories/GHSA-47wr-426j-fr82', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26277', 'https://github.com/datacharmer/dbdeployer/commit/548e256c1de2f99746e861454e7714ec6bc9bb10'} | null | {'https://github.com/datacharmer/dbdeployer/commit/548e256c1de2f99746e861454e7714ec6bc9bb10'} | {'https://github.com/datacharmer/dbdeployer/commit/548e256c1de2f99746e861454e7714ec6bc9bb10'} |
GHSA | GHSA-pxpf-v376-7xx5 | tagify can pass a malicious placeholder to initiate the cross-site scripting (XSS) payload | This affects the package @yaireo/tagify before 4.9.8. The package is used for rendering UI components inside the input or text fields, and an attacker can pass a malicious placeholder value to it to fire the cross-site scripting (XSS) payload. | {'CVE-2022-25854'} | 2022-05-03T04:55:33Z | 2022-04-30T00:00:33Z | MODERATE | 0 | null | {'https://github.com/yairEO/tagify/issues/988', 'https://snyk.io/vuln/SNYK-JS-YAIREOTAGIFY-2404358', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25854', 'https://github.com/yairEO/tagify/commit/198c0451fad188390390395ccfc84ab371def4c7', 'https://github.com/yairEO/tagify/releases/tag/v4.9.8', 'https://github.com/advisori... | null | {'https://github.com/yairEO/tagify/commit/198c0451fad188390390395ccfc84ab371def4c7'} | {'https://github.com/yairEO/tagify/commit/198c0451fad188390390395ccfc84ab371def4c7'} |
GHSA | GHSA-7gcp-w6ww-2xv9 | Path traversal and files overwrite with unsquashfs in singularity | ### Impact
Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs` (a distribution provided utility used by Singularity), it is possible to overwrite/create any files on the host filesystem during the extraction of a crafted squashfs filesystem.
Squashfs extraction occurs auto... | {'CVE-2020-15229'} | 2022-04-19T19:02:36Z | 2021-05-24T16:59:53Z | HIGH | 8.2 | {'CWE-22'} | {'https://github.com/hpcng/singularity/blob/v3.6.4/CHANGELOG.md#security-related-fixes', 'https://github.com/hpcng/singularity/pull/5611', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15229', 'https://github.com/hpcng/singularity/security/advis... | null | {'https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e'} | {'https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e'} |
GHSA | GHSA-cjvr-mfj7-j4j8 | Incorrect Authorization and Exposure of Sensitive Information to an Unauthorized Actor in scrapy | ### Impact
If you manually define cookies on a [`Request`](https://docs.scrapy.org/en/latest/topics/request-response.html#scrapy.http.Request) object, and that `Request` object gets a redirect response, the new `Request` object scheduled to follow the redirect keeps those user-defined cookies, regardless of the target... | {'CVE-2022-0577'} | 2022-04-05T18:51:14Z | 2022-03-01T22:12:47Z | MODERATE | 6.5 | {'CWE-200', 'CWE-863'} | {'https://github.com/advisories/GHSA-cjvr-mfj7-j4j8', 'https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html', 'https://github.com/scrapy/scrapy/security/advisories/GHSA-cjvr-mfj7-j4j8', 'https://nvd.nist.gov/vuln/detail/CV... | null | {'https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a'} | {'https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a'} |
GHSA | GHSA-92vm-mxjf-jqf3 | Improper Verification of Cryptographic Signature in starkbank-ecdsa | The `verify` function in the Stark Bank Python ECDSA library (starkbank-ecdsa) 2.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. | {'CVE-2021-43572'} | 2022-03-29T22:08:01Z | 2021-11-10T20:41:39Z | CRITICAL | 9.8 | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43572', 'https://github.com/starkbank/ecdsa-python/commit/d136170666e9510eb63c2572551805807bd4c17f', 'https://github.com/advisories/GHSA-92vm-mxjf-jqf3', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', ... | null | {'https://github.com/starkbank/ecdsa-python/commit/d136170666e9510eb63c2572551805807bd4c17f'} | {'https://github.com/starkbank/ecdsa-python/commit/d136170666e9510eb63c2572551805807bd4c17f'} |
GHSA | GHSA-vm67-7vmg-66vm | Arbitrary Command Injection in portprocesses | ### Impact
An Arbitrary Command Injection vulnerability was reported in `portprocesses` impacting versions <= 1.0.4.
### Example (Proof of Concept)
The following example demonstrates the vulnerability and will run `touch success` therefore creating a file named `success`.
```js
const portprocesses = require("portpr... | {'CVE-2021-23348'} | 2022-04-19T19:02:49Z | 2021-04-06T17:24:50Z | MODERATE | 6.4 | {'CWE-77', 'CWE-78'} | {'https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23348', 'https://github.com/rrainn/PortProcesses/blob/fffceb09aff7180afbd0bd172e820404b33c8299/index.js%23L23', 'https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7a... | null | {'https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7aa4214e1'} | {'https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7aa4214e1'} |
GHSA | GHSA-6635-c626-vj4r | Command Injection Vulnerability with Mercurial in VCS | URLs and local file paths passed to the Mercurial (hg) APIs that are specially crafted can contain commands which are executed by Mercurial if it is installed on the host operating system. The `vcs` package uses the underly version control system, in this case `hg`, to implement the needed functionality. When `hg` is e... | {'CVE-2022-21235'} | 2022-04-18T21:47:33Z | 2022-04-01T14:05:33Z | CRITICAL | 9.8 | {'CWE-88', 'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21235', 'https://github.com/Masterminds/vcs/commit/922a5122330ea8fbe56352a0172ddb6bf019cd22', 'https://github.com/advisories/GHSA-6635-c626-vj4r', 'https://github.com/Masterminds/vcs/security/advisories/GHSA-6635-c626-vj4r', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMI... | null | {'https://github.com/Masterminds/vcs/commit/922a5122330ea8fbe56352a0172ddb6bf019cd22'} | {'https://github.com/Masterminds/vcs/commit/922a5122330ea8fbe56352a0172ddb6bf019cd22'} |
GHSA | GHSA-q42q-523g-3fwv | Cross-Site Request Forgery | This affects the package com.softwaremill.akka-http-session:core_2.13 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.12 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.11 before 0.5.11. For older versions, endpoints protected by randomTokenCsrfProtection could be bypassed with... | {'CVE-2020-7780'} | 2022-02-09T23:06:40Z | 2022-02-09T23:06:40Z | MODERATE | 8.8 | {'CWE-352'} | {'https://github.com/softwaremill/akka-http-session/issues/77', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7780', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1045352', 'https://github.com/advisories/GHSA-q42q-523g-3fwv', 'https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d... | null | {'https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d164f655b9c5f953b41'} | {'https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d164f655b9c5f953b41'} |
GHSA | GHSA-pwqf-9h7j-7mv8 | Incorrect threshold signature computation in TUF | ### Impact
Metadadata signature verification, as used in `tuf.client.updater`, counted each of multiple signatures with identical authorized keyids separately towards the threshold. Therefore, an attacker with access to a valid signing key could create multiple valid signatures in order to meet the minimum threshold o... | {'CVE-2020-6174'} | 2022-03-23T23:02:07Z | 2020-08-21T16:25:26Z | CRITICAL | 9.8 | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-6174', 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-pwqf-9h7j-7mv8', 'https://github.com/theupdateframework/tuf/pull/974/commits/a0397c7c820ec1c30ebc793cc9469b61c8d3f50e', 'https://github.com/advisories/GHSA-pwqf-9h7j-7mv8', 'https://github.com/theupdat... | null | {'https://github.com/theupdateframework/tuf/pull/974/commits/a0397c7c820ec1c30ebc793cc9469b61c8d3f50e'} | {'https://github.com/theupdateframework/tuf/pull/974/commits/a0397c7c820ec1c30ebc793cc9469b61c8d3f50e'} |
GHSA | GHSA-23r4-5mxp-c7g5 | New anonymous user session acts as if it's created with password | ### Impact
Developers that use the REST API to signup users and also allow users to login anonymously. When an anonymous user is first signed up using REST, the server creates session incorrectly, particularly the `authProvider` field in `_Session` class under `createdWith` shows the user logged in creating a password... | {'CVE-2021-39138'} | 2022-04-19T19:02:51Z | 2021-08-23T19:41:52Z | MODERATE | 4.8 | {'CWE-287'} | {'https://github.com/parse-community/parse-server/security/advisories/GHSA-23r4-5mxp-c7g5', 'https://github.com/parse-community/parse-server/releases/tag/4.5.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39138', 'https://github.com/parse-community/parse-server/commit/147bd9a3dc43391e92c36e05d5db860b04ca27db', 'https:/... | null | {'https://github.com/parse-community/parse-server/commit/147bd9a3dc43391e92c36e05d5db860b04ca27db'} | {'https://github.com/parse-community/parse-server/commit/147bd9a3dc43391e92c36e05d5db860b04ca27db'} |
GHSA | GHSA-wc73-w5r9-x9pc | Cross-site Scripting in XXL-JOB | XXL-JOB 2.2.0 allows Stored XSS (in Add User) to bypass the 20-character limit via xxl-job-admin/src/main/java/com/xxl/job/admin/controller/UserController.java. | {'CVE-2020-29204'} | 2021-10-12T16:41:36Z | 2021-10-12T16:41:36Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-29204', 'https://github.com/advisories/GHSA-wc73-w5r9-x9pc', 'https://github.com/xuxueli/xxl-job/issues/2083', 'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'} | null | {'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'} | {'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'} |
GHSA | GHSA-4fr2-j4g9-mppf | Improperly Controlled Modification of Dynamically-Determined Object Attributes in deephas | Prototype pollution vulnerability in 'deephas' versions 1.0.0 through 1.0.5 allows attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2020-28271'} | 2021-09-24T15:42:21Z | 2021-09-24T15:42:21Z | CRITICAL | 9.8 | {'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28271', 'https://github.com/sharpred/deepHas/commit/2fe011713a6178c50f7deb6f039a8e5435981e20', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28271,', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28271', 'https://github.com/adviso... | null | {'https://github.com/sharpred/deepHas/commit/2fe011713a6178c50f7deb6f039a8e5435981e20'} | {'https://github.com/sharpred/deepHas/commit/2fe011713a6178c50f7deb6f039a8e5435981e20'} |
GHSA | GHSA-fpv6-f8jw-rc3r | Remote code execution via the web UI backend | ### Impact
Elvish's backend for the experimental web UI (started by `elvish -web`) hosts an endpoint that allows executing the code sent from the web UI.
The backend does not check the origin of requests correctly. As a result, if the user has the web UI backend open and visits a compromised or malicious website, the... | {'CVE-2021-41088'} | 2022-04-19T19:03:09Z | 2021-09-23T23:17:33Z | MODERATE | 8 | {'CWE-668'} | {'https://github.com/advisories/GHSA-fpv6-f8jw-rc3r', 'https://github.com/elves/elvish/security/advisories/GHSA-fpv6-f8jw-rc3r', 'https://github.com/elves/elvish/commit/ccc2750037bbbfafe9c1b7a78eadd3bd16e81fe5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41088'} | null | {'https://github.com/elves/elvish/commit/ccc2750037bbbfafe9c1b7a78eadd3bd16e81fe5'} | {'https://github.com/elves/elvish/commit/ccc2750037bbbfafe9c1b7a78eadd3bd16e81fe5'} |
GHSA | GHSA-p24j-h477-76q3 | Uncontrolled Search Path Element in sharkdp/bat | bat on windows before 0.18.2 executes programs named less.exe from the current working directory. This can lead to unintended code execution. | {'CVE-2021-36753'} | 2021-09-09T16:57:53Z | 2021-08-25T21:01:37Z | HIGH | 7.8 | {'CWE-427'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-36753', 'https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956', 'https://github.com/sharkdp/bat/releases/tag/v0.18.2', 'https://github.com/sharkdp/bat/pull/1724', 'https://github.com/advisories/GHSA-p24j-h477-76q3', 'https://vuln.ryotak.me/advisories... | null | {'https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956'} | {'https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956'} |
GHSA | GHSA-3r8j-pmch-5j2h | Internal exception message exposure for login action in Sylius | ## Internal exception message exposure for login action
### Impact
Exception messages from internal exceptions (like database exception) are wrapped by `\Symfony\Component\Security\Core\Exception\AuthenticationServiceException` and propagated through the system to UI. Therefore, some internal system information may le... | {'CVE-2019-16768'} | 2021-01-08T21:20:33Z | 2019-12-05T19:57:04Z | LOW | 3.5 | {'CWE-209'} | {'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-3r8j-pmch-5j2h', 'https://github.com/advisories/GHSA-3r8j-pmch-5j2h', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16768'} | null | {'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f'} | {'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f'} |
GHSA | GHSA-4w2v-q235-vp99 | Server-Side Request Forgery in Axios | Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address. | {'CVE-2020-28168'} | 2021-01-29T20:58:12Z | 2021-01-04T20:59:40Z | HIGH | 0 | {'CWE-918'} | {'https://www.npmjs.com/package/axios', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28168', 'https://www.npmjs.com/advisories/1594', 'https://snyk.io/vuln/SNYK-JS-AXIOS-1038255', 'https://github.com/axios/axios/commit/c7329fefc890050edd51e40e469a154d0117fc55', 'https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9... | null | {'https://github.com/axios/axios/commit/c7329fefc890050edd51e40e469a154d0117fc55'} | {'https://github.com/axios/axios/commit/c7329fefc890050edd51e40e469a154d0117fc55'} |
GHSA | GHSA-gwcx-jrx4-92w2 | Segfault in `simplifyBroadcast` in Tensorflow | ### Impact
The [`simplifyBroadcast` function in the MLIR-TFRT infrastructure in TensorFlow](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/mlir/tfrt/jit/transforms/tf_cpurt_symbolic_shape_optimization.cc#L149-L205) is vulnerable to a segfault (hence, denial of... | {'CVE-2022-23593'} | 2022-03-28T19:30:27Z | 2022-02-09T23:32:08Z | HIGH | 5.9 | {'CWE-754'} | {'https://github.com/advisories/GHSA-gwcx-jrx4-92w2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23593', 'https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gwcx-jrx4-92w2', 'https://github.com/tensorflow/tensorfl... | null | {'https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a'} | {'https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a'} |
GHSA | GHSA-jcxv-2j3h-mg59 | Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV | OpenCV 3.3.1 (corresponding with opencv-python and opencv-contrib-python 3.3.1.11) has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used. | {'CVE-2017-17760'} | 2021-11-18T15:31:01Z | 2021-10-12T22:03:09Z | MODERATE | 6.5 | {'CWE-119'} | {'https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html', 'https://github.com/advisories/GHSA-jcxv-2j3h-mg59', 'https://github.com/opencv/opencv/pull/10369/commits/7bbe1a53cfc097b82b1589f7915a2120de39274c', 'http://www.securityfocus.com/bid/102974', 'https://lists.debian.org/debian-lts-announce/2021/10/msg... | null | {'https://github.com/opencv/opencv/pull/10369/commits/7bbe1a53cfc097b82b1589f7915a2120de39274c'} | {'https://github.com/opencv/opencv/pull/10369/commits/7bbe1a53cfc097b82b1589f7915a2120de39274c'} |
GHSA | GHSA-6w9p-88qg-p3g3 | Cross-site Scripting in CKAN | In CKAN, versions 2.9.0 to 2.9.3 are affected by a stored XSS vulnerability via SVG file upload of users’ profile picture. This allows low privileged application users to store malicious scripts in their profile picture. These scripts are executed in a victim’s browser when they open the malicious profile picture | {'CVE-2021-25967'} | 2021-12-03T20:44:48Z | 2021-12-03T20:44:48Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/ckan/ckan/commit/5a46989c0a4f2c2873ca182c196da83b82babd25', 'https://github.com/ckan/ckan/pull/6477', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25967', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25967', 'https://github.com/advisories/GHSA-6w9p-88qg-p3g3'} | null | {'https://github.com/ckan/ckan/commit/5a46989c0a4f2c2873ca182c196da83b82babd25'} | {'https://github.com/ckan/ckan/commit/5a46989c0a4f2c2873ca182c196da83b82babd25'} |
GHSA | GHSA-x4r7-m2q9-69c8 | GraphiQL introspection schema template injection attack | - [1. Impact](#11-impact)
- [2. Scope](#12-scope)
- [3. Patches](#13-patches)
- [3.1 CDN bundle implementations may be automatically patched](#131-cdn-bundle-implementations-may-be-automatically-patched)
- [4. Workarounds for Older Versions](#14-workarounds-for-older-versions)
- [5. How to Re-create the E... | {'CVE-2021-41248'} | 2022-04-19T19:03:03Z | 2021-11-08T18:03:50Z | HIGH | 7.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41248', 'https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability', 'https://github.com/graphql/graphiql/commit/cb237eeeaf7333c4954c752122261db7520f7bf4', 'https://github.com/advisories/GHSA-x4r7-m2q9-69c... | null | {'https://github.com/graphql/graphiql/commit/cb237eeeaf7333c4954c752122261db7520f7bf4', 'https://github.com/graphql/graphiql/commit/6701b0b626e43800e32413590a295e5c1e3d5419#diff-d45eb76aebcffd27d3a123214487116fa95e0b5a11d70a94a0ce3033ce09f879R110', 'https://github.com/graphql/graphiql/commit/b9dec272d89d9c590727fd10d62... | {'https://github.com/graphql/graphiql/commit/b9dec272d89d9c590727fd10d62e4a47e0317fc7#diff-855b77f6310b7e4fb1bcac779cd945092ed49fd759f4684ea391b45101166437R87', 'https://github.com/graphql/graphiql/commit/cb237eeeaf7333c4954c752122261db7520f7bf4', 'https://github.com/graphql/graphiql/commit/6701b0b626e43800e32413590a29... |
GHSA | GHSA-qc53-44cj-vfvx | Denial of Service in Tensorflow | ### Impact
The `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has rank 2. This tensor must be a matrix because code assumes its elements are accessed as elements of a matrix:
https://github.c... | {'CVE-2020-15197'} | 2021-08-26T15:12:10Z | 2020-09-25T18:28:30Z | MODERATE | 6.3 | {'CWE-20', 'CWE-617'} | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qc53-44cj-vfvx', 'https://github.com/advisories/GHSA-qc53-44cj-vfvx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15197', 'https://github.com/tensorflow/tensorfl... | null | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} |
GHSA | GHSA-cwp9-956f-vcwh | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1141'} | 2021-03-29T20:57:56Z | 2021-03-29T20:57:56Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1141', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1141', 'https://github.com/advisories/GHSA-cwp9-956f-vcwh', 'https://github.com/chakra-core/ChakraC... | null | {'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | {'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} |
GHSA | GHSA-5mg8-w23w-74h3 | Information Disclosure in Guava | A temp directory creation vulnerability exists in all Guava versions allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava `com.google.common.io.Files.createTempDir()`. The permissions granted to the directory created default to the standard unix-like /... | {'CVE-2020-8908'} | 2022-04-26T20:59:22Z | 2021-03-25T17:04:19Z | LOW | 3.3 | {'CWE-200', 'CWE-173', 'CWE-732'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8908', 'https://lists.apache.org/thread.html/reebbd63c25bc1a946caa419cec2be78079f8449d1af48e52d47c9e85@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r6874dfe26eefc41b7c9a5e4a0487846fc4accf8c78ff948b24a1104a@%3Cdev.drill.apache.org%3E', 'https://lists.a... | null | {'https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40'} | {'https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40'} |
GHSA | GHSA-x8wj-cqmp-3wmm | Cross-site Scripting in Zenario CMS | Zenario CMS 9.0.54156 is vulnerable to Cross Site Scripting (XSS) via upload file to *.SVG. An attacker can send malicious files to victims and steals victim's cookie leads to account takeover. The person viewing the image of a contact can be victim of XSS. | {'CVE-2021-41952'} | 2022-03-29T21:14:28Z | 2022-03-15T00:00:59Z | MODERATE | 4.8 | {'CWE-79'} | {'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007', 'https://github.com/TribalSystems/Zenario/releases/tag/9.0.55141', 'https://github.com/advisories/GHSA-x8wj-cqmp-3wmm', 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/1', 'https://nvd.nist.gov/vuln/detail/CV... | null | {'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'} | {'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'} |
GHSA | GHSA-37pf-w9ff-gqvm | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20... | {'CVE-2019-0927'} | 2021-03-29T20:58:59Z | 2021-03-29T20:58:59Z | HIGH | 7.5 | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0927', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0927', 'https://github.com/advisories/GHSA-37pf-w9ff-gqvm', 'https://github.com/chakra-core/ChakraC... | null | {'https://github.com/chakra-core/ChakraCore/commit/87ac2b5a751710ee288fdda3fd4d9818e22387a1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/87ac2b5a751710ee288fdda3fd4d9818e22387a1'} |
GHSA | GHSA-h4mf-75hf-67w4 | Information disclosure in parse-server | 1. you can fetch all the users' objects, by using regex in the NoSQL query.
Using the NoSQL, you can use a regex on sessionToken `("_SessionToken":{"$regex":"r:027f"}}` and find valid accounts this way.
Using this method, it's possible to retrieve accounts without interaction from the users.
GET /parse/users/me HTTP/... | {'CVE-2020-5251'} | 2022-04-19T19:02:41Z | 2020-03-04T20:20:27Z | HIGH | 7.7 | {'CWE-200', 'CWE-285'} | {'https://github.com/parse-community/parse-server/commit/3a3a5eee5ffa48da1352423312cb767de14de269', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-h4mf-75hf-67w4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5251', 'https://github.com/advisories/GHSA-h4mf-75hf-67w4'} | null | {'https://github.com/parse-community/parse-server/commit/3a3a5eee5ffa48da1352423312cb767de14de269'} | {'https://github.com/parse-community/parse-server/commit/3a3a5eee5ffa48da1352423312cb767de14de269'} |
GHSA | GHSA-mvqp-q37c-wf9j | Moderate severity vulnerability that affects io.ratpack:ratpack-core | ## CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
Versions of Ratpack 0.9.1 through and including 1.7.4 are vulnerable to [HTTP Response Splitting](https://www.owasp.org/index.php/HTTP_Response_Splitting),
if untrusted and unsanitized data is used to populate the header... | {'CVE-2019-17513'} | 2021-09-15T21:01:30Z | 2019-10-21T16:08:43Z | HIGH | 7.5 | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-17513', 'https://github.com/ratpack/ratpack/releases/tag/v1.7.5', 'https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d', 'https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae', 'https://ratpack.io/versions/1.7.5', '... | null | {'https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d', 'https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae'} | {'https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae', 'https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d'} |
GHSA | GHSA-7gc6-qh9x-w6h8 | Incorrect Authorization in cross-fetch | When fetching a remote url with Cookie if it get Location response header then it will follow that url and try to fetch that url with provided cookie . So cookie is leaked here to thirdparty.
Ex: you try to fetch example.com with cookie and if it get redirect url to attacker.com then it fetch that redirect url with pro... | {'CVE-2022-1365'} | 2022-05-03T17:48:17Z | 2022-04-17T00:00:32Z | MODERATE | 6.1 | {'CWE-863', 'CWE-359'} | {'https://github.com/lquixada/cross-fetch/pull/135', 'https://huntr.dev/bounties/ab55dfdd-2a60-437a-a832-e3efe3d264ac', 'https://github.com/lquixada/cross-fetch/commit/a3b3a9481091ddd06b8f83784ba9c4e034dc912a', 'https://github.com/advisories/GHSA-7gc6-qh9x-w6h8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1365'} | null | {'https://github.com/lquixada/cross-fetch/commit/a3b3a9481091ddd06b8f83784ba9c4e034dc912a'} | {'https://github.com/lquixada/cross-fetch/commit/a3b3a9481091ddd06b8f83784ba9c4e034dc912a'} |
GHSA | GHSA-x27w-qxhg-343v | Access Restriction Bypass in go-ldap | In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go, an attacker may be able to login with an empty password. This issue affects an application using this package if these conditions are met: (1) it relies only on the return error of the Bind function call to determine whether a user is authorized (i.e., a nil re... | {'CVE-2017-14623'} | 2022-04-12T22:32:59Z | 2022-02-15T01:57:18Z | HIGH | 8.1 | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-14623', 'https://github.com/go-ldap/ldap/pull/126', 'https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66', 'https://github.com/advisories/GHSA-x27w-qxhg-343v'} | null | {'https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66'} | {'https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66'} |
GHSA | GHSA-545q-3fg6-48m7 | Regular expression denial of service (ReDoS) | This affects the package html-parse-stringify before 2.0.1; all versions of package html-parse-stringify2. Sending certain input could cause one of the regular expressions that is used for parsing to backtrack, freezing the process. | {'CVE-2021-23346'} | 2021-03-18T19:39:32Z | 2021-03-18T19:39:31Z | MODERATE | 5.3 | {'CWE-400'} | {'https://github.com/advisories/GHSA-545q-3fg6-48m7', 'https://github.com/HenrikJoreteg/html-parse-stringify/releases/tag/v2.0.1', 'https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306', 'https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307', 'https://github.com/rayd/html-parse-stringify2/blob/master/lib/parse.j... | null | {'https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12'} | {'https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12'} |
GHSA | GHSA-g2qj-pmxm-9f8f | User enumeration in authentication mechanisms | Description
-----------
The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authent... | null | 2021-10-08T21:21:13Z | 2021-05-17T20:52:32Z | LOW | 0 | {'CWE-200'} | {'https://github.com/symfony/symfony/security/advisories/GHSA-g2qj-pmxm-9f8f', 'https://github.com/advisories/GHSA-g2qj-pmxm-9f8f', 'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'} | null | {'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'} | {'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'} |
GHSA | GHSA-9qq2-xhmc-h9qr | Access Control Bypass | An issue was discovered in Rancher 2 through 2.1.5. Any project member with access to the default namespace can mount the netes-default service account in a pod, and then use that pod to execute administrative privileged commands against the k8s cluster. This could be mitigated by isolating the default namespace in a s... | {'CVE-2018-20321'} | 2022-04-25T20:21:12Z | 2021-06-23T17:57:10Z | MODERATE | 4.2 | {'CWE-288', 'CWE-668'} | {'https://rancher.com/blog/2019/2019-01-29-explaining-security-vulnerabilities-addressed-in-rancher-v2-1-6-and-v2-0-11/', 'https://github.com/rancher/rancher/commit/6ea187fcc2309d5a7a14ed47de5688bf6573f448', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20321', 'https://github.com/rancher/rancher/releases/tag/v2.1.6', 'ht... | null | {'https://github.com/rancher/rancher/commit/6ea187fcc2309d5a7a14ed47de5688bf6573f448'} | {'https://github.com/rancher/rancher/commit/6ea187fcc2309d5a7a14ed47de5688bf6573f448'} |
GHSA | GHSA-68q3-7wjp-7q3j | The filename of uploaded files vulnerable to stored XSS | ### Impact
The filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it.
Additionally, the measures to prevent renaming the file to disallowed file... | {'CVE-2020-4041'} | 2022-04-19T19:02:28Z | 2020-06-09T00:25:34Z | MODERATE | 7.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-4041', 'https://github.com/bolt/bolt/pull/7853', 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f', 'https://github.com/bolt/bolt/security/advisories/GHSA-68q3-7wjp-7q3j', 'https://github.com/advisories/GHSA-68q3-7wjp-7q3j', 'http://packetstormsec... | null | {'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'} | {'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'} |
GHSA | GHSA-82v2-mx6x-wq7q | Incorrect Default Permissions in log4js | ### Impact
Default file permissions for log files created by the file, fileSync and dateFile appenders are world-readable (in unix). This could cause problems if log files contain sensitive information. This would affect any users that have not supplied their own permissions for the files via the mode parameter in the... | {'CVE-2022-21704'} | 2022-04-19T19:03:20Z | 2022-01-21T18:53:27Z | MODERATE | 5.5 | {'CWE-276'} | {'https://github.com/advisories/GHSA-82v2-mx6x-wq7q', 'https://github.com/log4js-node/log4js-node/blob/v6.4.0/CHANGELOG.md#640', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21704', 'https://github.com/log4js-node/log4js-node/pull/1141/commits/8042252861a1b65adb66931fdf702ead34fa9b76', 'https://github.com/log4js-node/str... | null | {'https://github.com/log4js-node/log4js-node/pull/1141/commits/8042252861a1b65adb66931fdf702ead34fa9b76'} | {'https://github.com/log4js-node/log4js-node/pull/1141/commits/8042252861a1b65adb66931fdf702ead34fa9b76'} |
GHSA | GHSA-c2h3-6mxw-7mvq | Insufficiently restricted permissions on plugin directories | ### Impact
A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setui... | {'CVE-2021-41103'} | 2021-11-18T15:14:52Z | 2021-10-04T20:14:47Z | MODERATE | 5.9 | {'CWE-22'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41103', 'https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8', 'https://lists.fedoraproject.org/archives/li... | null | {'https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8'} | {'https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8'} |
GHSA | GHSA-pqrv-8r2f-7278 | Crash due to erroneous `StatusOr` in TensorFlow | ### Impact
A `GraphDef` from a TensorFlow `SavedModel` can be maliciously altered to cause a TensorFlow process to crash due to encountering [a `StatusOr` value that is an error and forcibly extracting the value from it](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/c... | {'CVE-2022-23590'} | 2022-02-11T20:00:43Z | 2022-02-09T23:29:38Z | MODERATE | 5.9 | {'CWE-754'} | {'https://github.com/tensorflow/tensorflow/commit/955059813cc325dc1db5e2daa6221271406d4439', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23590', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pqrv-8r2f-7278', 'https://github.com/advisories/GHSA-pqrv-8r2f-7278', 'https://github.com/tensorflow/tensorfl... | null | {'https://github.com/tensorflow/tensorflow/commit/955059813cc325dc1db5e2daa6221271406d4439'} | {'https://github.com/tensorflow/tensorflow/commit/955059813cc325dc1db5e2daa6221271406d4439'} |
GHSA | GHSA-vmf5-924f-25f2 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1106, CVE-2019-1107. | {'CVE-2019-1103'} | 2021-03-29T20:59:12Z | 2021-03-29T20:59:12Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/advisories/GHSA-vmf5-924f-25f2', 'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1103', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1103', 'https://github.com/chakra-core/ChakraC... | null | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba'} | {'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'} |
GHSA | GHSA-cqp5-m4pq-gfgp | Prototype Pollution in defaults-deep | Versions of `default-deep` before 0.2.4 are vulnerable to prototype pollution
## Recommendation
Update to version 0.2.4 or later. | {'CVE-2018-3723'} | 2021-01-08T18:56:59Z | 2018-07-26T15:18:43Z | LOW | 0 | {'CWE-471'} | {'https://github.com/jonschlinkert/defaults-deep/commit/c873f341327ad885ff4d0f23b3d3bca31b0343e5', 'https://github.com/advisories/GHSA-cqp5-m4pq-gfgp', 'https://hackerone.com/reports/310514', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3723', 'https://www.npmjs.com/advisories/581'} | null | {'https://github.com/jonschlinkert/defaults-deep/commit/c873f341327ad885ff4d0f23b3d3bca31b0343e5'} | {'https://github.com/jonschlinkert/defaults-deep/commit/c873f341327ad885ff4d0f23b3d3bca31b0343e5'} |
GHSA | GHSA-5f9h-9pjv-v6j7 | Directory traversal in Rack::Directory app bundled with Rack | A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure. | {'CVE-2020-8161'} | 2021-01-08T21:28:30Z | 2020-07-06T21:31:02Z | MODERATE | 0 | {'CWE-548'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8161', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html', 'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e', 'https://usn.ubuntu.com/4561-1/', 'https://hackerone.com/reports/434404', 'https://github.com/advisories/GHSA-5f9h-9pjv... | null | {'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e'} | {'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e'} |
GHSA | GHSA-h3vq-wv8j-36gw | Cross-site Scripting in Scratch-Svg-Renderer | A DOM-based cross-site scripting (XSS) vulnerability in Scratch-Svg-Renderer v0.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted sb3 file. | {'CVE-2020-27428'} | 2022-01-08T00:44:33Z | 2022-01-08T00:44:33Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-h3vq-wv8j-36gw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27428', 'https://github.com/LLK/scratch-svg-renderer/commit/7c74ec7de3254143ec3c557677f5355a90a3d07f'} | null | {'https://github.com/LLK/scratch-svg-renderer/commit/7c74ec7de3254143ec3c557677f5355a90a3d07f'} | {'https://github.com/LLK/scratch-svg-renderer/commit/7c74ec7de3254143ec3c557677f5355a90a3d07f'} |
GHSA | GHSA-5rq8-3wvf-wrfg | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20... | {'CVE-2019-0933'} | 2021-03-29T20:59:01Z | 2021-03-29T20:59:01Z | HIGH | 7.5 | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0933', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0933', 'https://github.com/advisories/GHSA-5rq8-3wvf-wrfg', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraC... | null | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf'} |
GHSA | GHSA-4365-fhm5-qcrx | Maliciously Crafted Model Archive Can Lead To Arbitrary File Write | ### Impact
An Archive Extraction (Zip Slip) vulnerability in the functionality that allows a user to load a trained model archive in Rasa 2.8.9 and older allows an attacker arbitrary write capability within specific directories using a malicious crafted archive file.
### Patches
The vulnerability is fixed in Rasa 2.8.... | {'CVE-2021-41127'} | 2021-10-22T16:19:13Z | 2021-10-22T16:19:13Z | HIGH | 7.3 | {'CWE-23', 'CWE-22'} | {'https://github.com/advisories/GHSA-4365-fhm5-qcrx', 'https://github.com/RasaHQ/rasa/commit/1b6b502f52d73b4f8cd1959ce724b8ad0eb33989', 'https://github.com/RasaHQ/rasa/security/advisories/GHSA-4365-fhm5-qcrx'} | null | {'https://github.com/RasaHQ/rasa/commit/1b6b502f52d73b4f8cd1959ce724b8ad0eb33989'} | {'https://github.com/RasaHQ/rasa/commit/1b6b502f52d73b4f8cd1959ce724b8ad0eb33989'} |
GHSA | GHSA-624f-cqvr-3qw4 | URL Redirection to Untrusted Site ('Open Redirect') in Flask-AppBuilder | ### Impact
If using Flask-AppBuilder OAuth, an attacker can share a carefully crafted URL with a trusted domain for an application built with Flask-AppBuilder, this URL can redirect a user to a malicious site. This is an open redirect vulnerability
### Patches
Install Flask-AppBuilder 3.2.2 or above
### Workarounds
... | {'CVE-2021-32805'} | 2021-09-09T13:33:27Z | 2021-09-08T21:11:14Z | HIGH | 7.2 | {'CWE-601'} | {'https://github.com/advisories/GHSA-624f-cqvr-3qw4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32805', 'https://github.com/dpgaspar/Flask-AppBuilder/commit/6af28521589599b1dbafd6313256229ee9a4fa74', 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-624f-cqvr-3qw4', 'https://github.com/dpgaspar/Fl... | null | {'https://github.com/dpgaspar/Flask-AppBuilder/commit/6af28521589599b1dbafd6313256229ee9a4fa74'} | {'https://github.com/dpgaspar/Flask-AppBuilder/commit/6af28521589599b1dbafd6313256229ee9a4fa74'} |
GHSA | GHSA-694p-xrhg-x3wm | CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request Header Injection') | ### Vulnerability
Micronaut's HTTP client is vulnerable to "HTTP Request Header Injection" due to not validating request headers passed to the client.
Example of vulnerable code:
```java
@Controller("/hello")
public class HelloController {
@Inject
@Client("/")
RxHttpClient client;
@Get("/external-e... | {'CVE-2020-7611'} | 2022-04-19T19:02:23Z | 2020-03-30T20:54:55Z | CRITICAL | 9.8 | {'CWE-444'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7611', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-694p-xrhg-x3wm', 'https://snyk.io/vuln/SNYK-JAVA-IOMICRONAUT-561342', 'https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add', 'https://github.... | null | {'https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d', 'https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add', 'https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1'} | {'https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d', 'https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add', 'https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1'} |
GHSA | GHSA-4w23-c97g-fq5v | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF) | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-4130'} | 2022-01-05T20:33:16Z | 2022-01-05T20:33:16Z | HIGH | 8.8 | {'CWE-352'} | {'https://huntr.dev/bounties/ccf073cd-7f54-4d51-89f2-6b4a2e4ae81e', 'https://github.com/advisories/GHSA-4w23-c97g-fq5v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4130', 'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae'} | null | {'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae'} | {'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae'} |
GHSA | GHSA-pv4c-p2j5-38j4 | Open Redirect in url-parse | Versions of `url-parse` before 1.4.3 returns the wrong hostname which could lead to Open Redirect, Server Side Request Forgery (SSRF), or Bypass Authentication Protocol vulnerabilities.
## Recommendation
Update to version 1.4.3 or later. | {'CVE-2018-3774'} | 2021-01-08T18:18:31Z | 2018-08-13T15:02:15Z | HIGH | 0 | {'CWE-425'} | {'https://github.com/advisories/GHSA-pv4c-p2j5-38j4', 'https://hackerone.com/reports/384029', 'https://github.com/unshiftio/url-parse/commit/d7b582ec1243e8024e60ac0b62d2569c939ef5de', 'https://www.npmjs.com/advisories/678', 'https://github.com/unshiftio/url-parse/commit/53b1794e54d0711ceb52505e0f74145270570d5a', 'https... | null | {'https://github.com/unshiftio/url-parse/commit/53b1794e54d0711ceb52505e0f74145270570d5a', 'https://github.com/unshiftio/url-parse/commit/d7b582ec1243e8024e60ac0b62d2569c939ef5de'} | {'https://github.com/unshiftio/url-parse/commit/d7b582ec1243e8024e60ac0b62d2569c939ef5de', 'https://github.com/unshiftio/url-parse/commit/53b1794e54d0711ceb52505e0f74145270570d5a'} |
GHSA | GHSA-phwq-j96m-2c2q | Template injection in ejs | The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation). | {'CVE-2022-29078'} | 2022-04-27T14:36:25Z | 2022-04-26T00:00:40Z | HIGH | 0 | {'CWE-74'} | {'https://github.com/mde/ejs/commit/15ee698583c98dadc456639d6245580d17a24baf', 'https://github.com/advisories/GHSA-phwq-j96m-2c2q', 'https://eslam.io/posts/ejs-server-side-template-injection-rce/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29078'} | null | {'https://github.com/mde/ejs/commit/15ee698583c98dadc456639d6245580d17a24baf'} | {'https://github.com/mde/ejs/commit/15ee698583c98dadc456639d6245580d17a24baf'} |
GHSA | GHSA-xw79-hhv6-578c | Cross-Site Scripting in serve | Versions of `serve` prior to 10.0.2 are vulnerable to Cross-Site Scripting (XSS). The package does not encode output, allowing attackers to execute arbitrary JavaScript in the victim's browser if user-supplied input is rendered.
## Recommendation
Upgrade to version 10.0.2 or later. | null | 2021-09-28T16:54:34Z | 2020-09-11T21:16:59Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-xw79-hhv6-578c', 'https://github.com/zeit/serve-handler/commit/65b4d4183a31a8076c78c40118acb0ca1b64f620', 'https://hackerone.com/reports/358641', 'https://hackerone.com/reports/398285', 'https://www.npmjs.com/advisories/971'} | null | {'https://github.com/zeit/serve-handler/commit/65b4d4183a31a8076c78c40118acb0ca1b64f620'} | {'https://github.com/zeit/serve-handler/commit/65b4d4183a31a8076c78c40118acb0ca1b64f620'} |
GHSA | GHSA-xrpj-f9v6-2332 | CSV injection in Craft CMS | # Withdrawn
Duplicate of GHSA-h7vq-5qgw-jwwq | null | 2021-10-18T19:09:51Z | 2021-10-04T20:12:45Z | HIGH | 8.8 | {'CWE-1236', 'CWE-74'} | {'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824', 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq', 'https://github.com/advisories/GHSA-xrpj-f9v6-2332', 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e840... | null | {'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'} | {'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'} |
GHSA | GHSA-v3q9-2p3m-7g43 | Token reuse in github.com/ory/fosite | ### Impact
When using client authentication method "private_key_jwt" [1], OpenId specification says the following about assertion `jti`:
> A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the pa... | {'CVE-2020-15222'} | 2021-11-19T15:24:07Z | 2021-05-24T16:57:52Z | HIGH | 8.1 | {'CWE-287', 'CWE-345'} | {'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9', 'https://github.com/advisories/GHSA-v3q9-2p3m-7g43', 'https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15222', 'https://github.com/ory/fosite/releases/tag/v0.31.0', 'https:... | null | {'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9'} | {'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9'} |
GHSA | GHSA-5vq5-pg3r-9ph3 | Path Traversal in Zope | Zope is an open-source web application server. This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities. Most Python modules are not available for using in TAL expressions that you can ... | {'CVE-2021-32674'} | 2022-01-03T15:56:18Z | 2021-06-10T17:22:08Z | HIGH | 8.8 | {'CWE-12', 'CWE-22'} | {'https://github.com/advisories/GHSA-5vq5-pg3r-9ph3', 'https://github.com/zopefoundation/Zope/commit/1d897910139e2c0b11984fc9b78c1da1365bec21', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-rpcg-f9q6-2mq6', 'https://pypi.org/project/Zope/', 'https://github.com/zopefoundation/Zope/security/advisories/... | null | {'https://github.com/zopefoundation/Zope/commit/1d897910139e2c0b11984fc9b78c1da1365bec21'} | {'https://github.com/zopefoundation/Zope/commit/1d897910139e2c0b11984fc9b78c1da1365bec21'} |
GHSA | GHSA-pp7h-53gx-mx7r | Remote Memory Exposure in bl | A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() ca... | {'CVE-2020-8244'} | 2021-05-10T16:25:30Z | 2020-09-02T15:26:19Z | HIGH | 6.5 | {'CWE-126', 'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8244', 'https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e', 'https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466', 'https://github.com/advisories/GHSA-pp7h-53gx-mx7r', 'https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76e... | null | {'https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e', 'https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466', 'https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190'} | {'https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190', 'https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e', 'https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466'} |
GHSA | GHSA-7wgr-7666-7pwj | Path Traversal in openapi-python-client | ### Impact
Path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.
Giving this a CVSS score of 3.0 (Low) with CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N/E:P/RL:U/RC:C
### Patches
A fix is... | {'CVE-2020-15141'} | 2022-04-19T19:02:33Z | 2020-08-20T14:38:13Z | LOW | 3 | {'CWE-22'} | {'https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15141', 'https://pypi.org/project/openapi-python-client', 'https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746', 'https://github.com/tria... | null | {'https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746'} | {'https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746'} |
GHSA | GHSA-7v7w-f7c6-f829 | yetiforcecrm is vulnerable to Business Logic Errors | yetiforcecrm is vulnerable to Business Logic Errors. | {'CVE-2021-4111'} | 2022-01-03T15:47:59Z | 2021-12-16T21:01:15Z | HIGH | 7.3 | null | {'https://github.com/advisories/GHSA-7v7w-f7c6-f829', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4111', 'https://huntr.dev/bounties/8afc8981-baff-4082-b640-be535b29eb9a'} | null | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf'} | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf'} |
GHSA | GHSA-952p-fqcp-g8pc | HTML injection possibility in voucher code form in Shopware | ### Impact
HTML injection possibility in voucher code form
## Patches
Patched in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarou... | {'CVE-2022-24746'} | 2022-03-18T20:14:16Z | 2022-03-10T17:49:26Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022?category=security-updates', 'https://github.com/advisories/GHSA-952p-fqcp-g8pc', 'https://github.com/shopware/platform/security/advisories/GHSA-95... | null | {'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6'} | {'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6'} |
GHSA | GHSA-jhj6-5mh6-4pvf | Denial-of-Service within Docker container | ### Impact
If you run teler inside a Docker container and encounter `errors.Exit` function, it will cause denial-of-service (`SIGSEGV`) because it doesn't get process ID and process group ID of teler properly to kills.
### Patches
Upgrade to the >= 0.0.1 version.
### Workarounds
N/A
### References
- https://github.c... | {'CVE-2020-26213'} | 2021-10-11T21:06:20Z | 2021-05-24T17:00:46Z | MODERATE | 7.5 | {'CWE-476'} | {'https://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7e', 'https://github.com/advisories/GHSA-jhj6-5mh6-4pvf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26213', 'https://github.com/kitabisa/teler/security/advisories/GHSA-jhj6-5mh6-4pvf'} | null | {'https://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7e'} | {'https://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7e'} |
GHSA | GHSA-45q2-34rf-mr94 | Code Injection in mquery | lib/utils.js in mquery before 3.2.3 allows a pollution attack because a special property (e.g., __proto__) can be copied during a merge or clone operation. | {'CVE-2020-35149'} | 2020-12-18T18:23:43Z | 2020-12-18T18:23:43Z | MODERATE | 5.3 | {'CWE-94'} | {'https://github.com/aheckmann/mquery/commit/792e69fd0a7281a0300be5cade5a6d7c1d468ad4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35149', 'https://github.com/advisories/GHSA-45q2-34rf-mr94'} | null | {'https://github.com/aheckmann/mquery/commit/792e69fd0a7281a0300be5cade5a6d7c1d468ad4'} | {'https://github.com/aheckmann/mquery/commit/792e69fd0a7281a0300be5cade5a6d7c1d468ad4'} |
GHSA | GHSA-9735-p6r2-2hgh | Out-of-bounds write | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0884, CVE-2019-0918. | {'CVE-2019-0911'} | 2021-03-29T21:00:00Z | 2021-03-29T21:00:00Z | HIGH | 7.5 | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0911', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0911', 'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337',... | null | {'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337'} |
GHSA | GHSA-c38g-469g-cmgx | "Improper Neutralization of Special Elements in Output in helm.sh/helm/v3" |
Since Helm 2 was released, a well-documented aspect of Helm is that the Helm chart's version number MUST follow the SemVer2 specification. In the past, Helm would not permit charts with malformed versions. At some point, a patch was merged that changed this - On a version parse error, the version number was simply pas... | {'CVE-2021-21303'} | 2021-06-23T18:14:40Z | 2021-06-23T18:14:40Z | MODERATE | 5.9 | {'CWE-74', 'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21303', 'https://github.com/helm/helm/releases/tag/v3.5.2', 'https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a', 'https://github.com/helm/helm/security/advisories/GHSA-c38g-469g-cmgx', 'https://github.com/advisories/GHSA-c38g-469g-cmgx'} | null | {'https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a'} | {'https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a'} |
GHSA | GHSA-733f-44f3-3frw | Open redirect | macaron before 1.3.7 has an open redirect in the static handler, as demonstrated by the http://127.0.0.1:4000//example.com/ URL. | {'CVE-2020-12666'} | 2021-05-18T21:08:35Z | 2021-05-18T21:08:35Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/go-macaron/macaron/pull/199/commits/6bd9385542f7133467ab7d09a5f28f7d5dc52af7', 'https://github.com/go-macaron/macaron/releases/tag/v1.3.7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12666', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QEUOHRC4EN4... | null | {'https://github.com/go-macaron/macaron/pull/199/commits/6bd9385542f7133467ab7d09a5f28f7d5dc52af7'} | {'https://github.com/go-macaron/macaron/pull/199/commits/6bd9385542f7133467ab7d09a5f28f7d5dc52af7'} |
GHSA | GHSA-hxcm-v35h-mg2x | Prototype Pollution | A vulnerability was found in querystringify before 2.0.0. It's possible to override built-in properties of the resulting query string object if a malicious string is inserted in the query string. | null | 2021-02-25T17:25:44Z | 2019-06-07T21:12:50Z | HIGH | 0 | {'CWE-1312'} | {'https://github.com/unshiftio/querystringify/pull/19', 'https://github.com/unshiftio/querystringify/commit/422eb4f6c7c28ee5f100dcc64177d3b68bb2b080', 'https://github.com/advisories/GHSA-hxcm-v35h-mg2x'} | null | {'https://github.com/unshiftio/querystringify/commit/422eb4f6c7c28ee5f100dcc64177d3b68bb2b080'} | {'https://github.com/unshiftio/querystringify/commit/422eb4f6c7c28ee5f100dcc64177d3b68bb2b080'} |
GHSA | GHSA-699q-wcff-g9mj | Unsafe deserialization in Yii 2 | ### Impact
Remote code execution in case application calls `unserialize()` on user input containing specially crafted string.
### Patches
2.0.38
### Workarounds
Add the following to BatchQueryResult.php:
```php
public function __sleep()
{
throw new \BadMethodCallException('Cannot serialize '.__CLASS__);
}
pu... | {'CVE-2020-15148'} | 2022-04-19T19:02:33Z | 2020-09-15T18:19:56Z | HIGH | 8.9 | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15148', 'https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj', 'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99', 'https://github.com/advisories/GHSA-699q-wcff-g9mj'} | null | {'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99'} | {'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99'} |
GHSA | GHSA-pcqq-5962-hvcw | Denial of Service in uap-core when processing crafted User-Agent strings | ### Impact
Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.
### Patches
Please update `uap-ruby` to >= v2.6.0
#... | null | 2022-04-19T19:02:24Z | 2020-03-10T18:02:49Z | HIGH | 0 | null | {'https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a', 'https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw', 'https://github.com/advisories/GHSA-pcqq-5962-hvcw'} | null | {'https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a'} | {'https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a'} |
GHSA | GHSA-5jxc-hmqf-3f73 | Cross-Site Scripting in grav | grav prior to version 1.7.24 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | {'CVE-2021-3904'} | 2021-11-01T19:17:31Z | 2021-11-01T19:17:31Z | MODERATE | 6.3 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3904', 'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d', 'https://github.com/advisories/GHSA-5jxc-hmqf-3f73', 'https://huntr.dev/bounties/b1182515-d911-4da9-b4f7-b4c341a62a8d'} | null | {'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d'} | {'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d'} |
GHSA | GHSA-xf5p-87ch-gxw2 | Regular Expression Denial of Service in marked | Versions of `marked` prior to 0.6.2 and later than 0.3.14 are vulnerable to Regular Expression Denial of Service. Email addresses may be evaluated in quadratic time, allowing attackers to potentially crash the node process due to resource exhaustion.
## Recommendation
Upgrade to version 0.6.2 or later. | null | 2021-08-04T20:53:01Z | 2019-06-05T14:10:03Z | MODERATE | 5.3 | {'CWE-400'} | {'https://www.npmjs.com/advisories/812', 'https://github.com/markedjs/marked/issues/1070', 'https://github.com/markedjs/marked/pull/1460', 'https://snyk.io/vuln/SNYK-JS-MARKED-174116', 'https://github.com/markedjs/marked/commit/b15e42b67cec9ded8505e9d68bb8741ad7a9590d', 'https://github.com/advisories/GHSA-xf5p-87ch-gxw... | null | {'https://github.com/markedjs/marked/commit/b15e42b67cec9ded8505e9d68bb8741ad7a9590d'} | {'https://github.com/markedjs/marked/commit/b15e42b67cec9ded8505e9d68bb8741ad7a9590d'} |
GHSA | GHSA-h74j-692g-48mq | Path Traversal in MHolt Archiver | All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final... | {'CVE-2019-10743'} | 2021-05-18T15:31:53Z | 2021-05-18T15:31:53Z | MODERATE | 5.5 | {'CWE-29'} | {'https://github.com/advisories/GHSA-h74j-692g-48mq', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10743', 'https://github.com/mholt/archiver/pull/169', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728,', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/mholt/archiver/pull/203', ... | null | {'https://github.com/mholt/archiver/commit/8217ed3a206c0473b4ec1aff51375b398838073a'} | {'https://github.com/mholt/archiver/commit/8217ed3a206c0473b4ec1aff51375b398838073a'} |
GHSA | GHSA-fp63-499m-hq6m | Files or Directories Accessible to External Parties in ether/logs | ### Impact
A vulnerability was found that allowed authenticated admin users to access any file on the server.
### Patches
The vulnerability has been fixed in 3.0.4.
### Workarounds
We recommend disabling the plugin if untrustworthy sources have admin access.
### For more information
If you have any questions or comm... | {'CVE-2021-32752'} | 2021-07-12T23:09:42Z | 2021-07-12T16:53:00Z | HIGH | 7.2 | {'CWE-552'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32752', 'https://github.com/ethercreative/logs/security/advisories/GHSA-fp63-499m-hq6m', 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4', 'https://github.com/ethercreative/logs/releases/tag/3.0.4', 'https://github.com/advisories/GHSA-fp... | null | {'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'} | {'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'} |
GHSA | GHSA-g98m-96g9-wfjq | Insecure path handling in Bundler | Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in th... | {'CVE-2019-3881'} | 2021-11-03T14:52:01Z | 2021-05-10T14:53:59Z | HIGH | 7 | {'CWE-552', 'CWE-427'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-3881', 'https://github.com/rubygems/bundler/pull/7416/commits/65cfebb041c454c246aaf32a177b0243915a9998', 'https://github.com/advisories/GHSA-g98m-96g9-wfjq', 'https://bugzilla.redhat.com/show_bug.cgi?id=1651826', 'https://github.com/rubygems/bundler/issues/6501'} | null | {'https://github.com/rubygems/bundler/pull/7416/commits/65cfebb041c454c246aaf32a177b0243915a9998'} | {'https://github.com/rubygems/bundler/pull/7416/commits/65cfebb041c454c246aaf32a177b0243915a9998'} |
GHSA | GHSA-3vjf-82ff-p4r3 | Incorrect protocol extraction via \r, \n and \t characters | \r, \n and \t characters in user-input URLs can potentially lead to incorrect protocol extraction when using npm package urijs prior to version 1.19.11.
This can lead to XSS when the module is used to prevent passing in malicious javascript: links into HTML or Javascript (see following example):
````
const parse = req... | {'CVE-2022-1243'} | 2022-04-14T20:13:56Z | 2022-04-06T00:01:31Z | HIGH | 7.2 | {'CWE-20'} | {'https://github.com/advisories/GHSA-3vjf-82ff-p4r3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1243', 'https://huntr.dev/bounties/8c5afc47-1553-4eba-a98e-024e4cc3dfb7', 'https://github.com/medialize/uri.js/commit/b0c9796aa1a95a85f40924fb18b1e5da3dc8ffae'} | null | {'https://github.com/medialize/uri.js/commit/b0c9796aa1a95a85f40924fb18b1e5da3dc8ffae'} | {'https://github.com/medialize/uri.js/commit/b0c9796aa1a95a85f40924fb18b1e5da3dc8ffae'} |
GHSA | GHSA-m697-4v8f-55qg | Header dropping in traefik | # Impact
There exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however, the Traefik team has addressed this issue to prevent any potential abuse.
# Details
... | {'CVE-2021-32813'} | 2021-08-31T20:57:11Z | 2021-08-05T17:04:21Z | MODERATE | 4.8 | {'CWE-913'} | {'https://github.com/traefik/traefik/releases/tag/v2.4.13', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32813', 'https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9', 'https://github.com/traefik/traefik/security/advisories/GHSA-m697-4v8f-55qg', 'https://github.com/advisories/GHS... | null | {'https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9'} | {'https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9'} |
GHSA | GHSA-2877-693q-pj33 | OS Command Injection in GenieACS | In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check. | {'CVE-2021-46704'} | 2022-03-14T21:30:23Z | 2022-03-07T00:00:40Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6', 'https://github.com/genieacs/genieacs/releases/tag/v1.2.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46704', 'https://github.com/advisories/GHSA-2877-693q-pj33'} | null | {'https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6'} | {'https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6'} |
GHSA | GHSA-j4f2-536g-r55m | Resource exhaustion in engine.io | Engine.IO before 4.0.0 allows attackers to cause a denial of service (resource consumption) via a POST request to the long polling transport. | {'CVE-2020-36048'} | 2022-02-09T22:29:04Z | 2022-02-09T22:29:04Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/socketio/engine.io/commit/734f9d1268840722c41219e69eb58318e0b2ac6b', 'https://github.com/bcaller/kill-engine-io', 'https://blog.caller.xyz/socketio-engineio-dos/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36048', 'https://github.com/advisories/GHSA-j4f2-536g-r55m'} | null | {'https://github.com/socketio/engine.io/commit/734f9d1268840722c41219e69eb58318e0b2ac6b'} | {'https://github.com/socketio/engine.io/commit/734f9d1268840722c41219e69eb58318e0b2ac6b'} |
GHSA | GHSA-88jf-7rch-32qc | Path Traversal in github.com/unknwon/cae/tz | "The ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "..". This allows an attacker to add or replace files system-wide." | {'CVE-2020-7668'} | 2022-01-04T19:33:15Z | 2021-05-18T20:31:18Z | HIGH | 7.5 | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAETZ-570384', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7668', 'https://github.com/advisories/GHSA-88jf-7rch-32qc', 'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'} | null | {'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'} | {'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'} |
GHSA | GHSA-c45w-2wxr-pp53 | Heap OOB read in `tf.raw_ops.Dequantize` | ### Impact
Due to lack of validation in `tf.raw_ops.Dequantize`, an attacker can trigger a read from outside of bounds of heap allocated data:
```python
import tensorflow as tf
input_tensor=tf.constant(
[75, 75, 75, 75, -6, -9, -10, -10, -10, -10, -10, -10, -10, -10, -10, -10,\
-10, -10, -10, -10, -10, -10, -10, ... | {'CVE-2021-29582'} | 2021-05-21T14:26:32Z | 2021-05-21T14:26:32Z | LOW | 2.5 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c45w-2wxr-pp53', 'https://github.com/advisories/GHSA-c45w-2wxr-pp53', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29582', 'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b'} | null | {'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b'} | {'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b'} |
GHSA | GHSA-w4vg-rf63-f3j3 | Arbitrary code using "crafted image file" approach affecting Pillow | Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component. | {'CVE-2016-9190'} | 2022-04-26T18:06:20Z | 2018-07-12T14:45:42Z | HIGH | 7.8 | {'CWE-284'} | {'https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af', 'http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html', 'http://www.securityfocus.com/bid/94234', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/python-pillow/Pillow/issues/2105', 'http://w... | null | {'https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af'} | {'https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af'} |
GHSA | GHSA-5vfx-8w6m-h3v4 | Authentication bypass due to improper user-provided security token verification | A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account ... | {'CVE-2021-41129'} | 2021-10-12T21:45:12Z | 2021-10-04T20:14:13Z | HIGH | 8.1 | {'CWE-502', 'CWE-639', 'CWE-807'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41129', 'https://github.com/pterodactyl/panel/blob/v1.6.2/CHANGELOG.md#v162', 'https://github.com/pterodactyl/panel/releases/tag/v1.6.2', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-5vfx-8w6m-h3v4', 'https://github.com/advisories/GHSA-5vfx-8w6m-h3v4', 'http... | null | {'https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977'} | {'https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977'} |
GHSA | GHSA-9vp5-m38w-j776 | Aliases are never checked in helm | ### Impact
During a security audit of Helm's code base, security researchers at Trail of Bits identified a bug in which the `alias` field on a `Chart.yaml` is not properly sanitized. This could lead to the injection of unwanted information into a chart.
### Patches
This issue has been patched in Helm 3.3.2 and 2.16.... | {'CVE-2020-15184'} | 2021-11-19T15:29:13Z | 2021-05-24T16:56:58Z | LOW | 3.7 | {'CWE-74', 'CWE-20'} | {'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://github.com/helm/helm/security/advisories/GHSA-9vp5-m38w-j776', 'https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15184', 'https://github.com/advisories/GHSA-... | null | {'https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850', 'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946'} | {'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850'} |
GHSA | GHSA-vgmw-9cww-qq99 | Incorrect Authorization in calibreweb | calibreweb prior to version 0.6.16 contains an Incorrect Authorization vulnerability. | {'CVE-2022-0273'} | 2022-02-16T22:04:14Z | 2022-01-31T00:00:29Z | MODERATE | 6.5 | {'CWE-863', 'CWE-284'} | {'https://github.com/advisories/GHSA-vgmw-9cww-qq99', 'https://huntr.dev/bounties/8f27686f-d698-4ab6-8ef0-899125792f13', 'https://github.com/janeczku/calibre-web/commit/0c0313f375bed7b035c8c0482bbb09599e16bfcf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0273'} | null | {'https://github.com/janeczku/calibre-web/commit/0c0313f375bed7b035c8c0482bbb09599e16bfcf'} | {'https://github.com/janeczku/calibre-web/commit/0c0313f375bed7b035c8c0482bbb09599e16bfcf'} |
GHSA | GHSA-54xj-q58h-9x57 | Arbitrary File Write in iobroker.admin | Versions of `iobroker.admin` prior to 3.6.12 are vulnerable to Path Traversal. The package fails to restrict access to folders outside of the intended folder in the `/log/` route, which may allow attackers to include arbitrary files in the system. An attacker would need to be authenticated to perform the attack but the... | {'CVE-2019-10765'} | 2021-10-01T20:14:11Z | 2020-09-04T15:24:56Z | CRITICAL | 9.8 | {'CWE-22'} | {'https://github.com/advisories/GHSA-54xj-q58h-9x57', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10765', 'https://www.npmjs.com/advisories/1346', 'https://snyk.io/vuln/SNYK-JS-IOBROKERADMIN-534634', 'https://github.com/ioBroker/ioBroker.admin/commit/16b2b325ab47896090bc7f54b77b0a97ed74f5cd'} | null | {'https://github.com/ioBroker/ioBroker.admin/commit/16b2b325ab47896090bc7f54b77b0a97ed74f5cd'} | {'https://github.com/ioBroker/ioBroker.admin/commit/16b2b325ab47896090bc7f54b77b0a97ed74f5cd'} |
GHSA | GHSA-3qgw-p4fm-x7gf | Division by zero in TFLite's convolution code | ### Impact
TFLite's [convolution code](https://github.com/tensorflow/tensorflow/blob/09c73bca7d648e961dd05898292d91a8322a9d45/tensorflow/lite/kernels/conv.cc) has multiple division where the divisor is controlled by the user and not checked to be non-zero. For example:
```cc
const int input_size = NumElements(input) ... | {'CVE-2021-29594'} | 2021-05-21T14:27:45Z | 2021-05-21T14:27:45Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qgw-p4fm-x7gf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29594', 'https://github.com/advisories/GHSA-3qgw-p4fm-x7gf', 'https://github.com/tensorflow/tensorflow/commit/ff489d95a9006be080ad14feb378f2b4dac35552'} | null | {'https://github.com/tensorflow/tensorflow/commit/ff489d95a9006be080ad14feb378f2b4dac35552'} | {'https://github.com/tensorflow/tensorflow/commit/ff489d95a9006be080ad14feb378f2b4dac35552'} |
GHSA | GHSA-53m6-44rc-h2q5 | Missing server signature validation in OctoberCMS | ### Impact
This advisory affects authors of plugins and themes listed on the October CMS marketplace where an end-user will inadvertently expose authors to potential financial loss by entering their private license key into a compromised server.
It has been disclosed that a project fork of October CMS v1.0 is using a... | {'CVE-2022-23655'} | 2022-03-08T18:23:38Z | 2022-02-24T13:09:30Z | MODERATE | 4.8 | {'CWE-347'} | {'https://github.com/octobercms/october/security/advisories/GHSA-53m6-44rc-h2q5', 'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a', 'https://github.com/advisories/GHSA-53m6-44rc-h2q5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23655'} | null | {'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a'} | {'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.